Skip to content

IBM AIX 7.x Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • The AIX operating system must be configured to use a valid server_ca.pem file.

    <VulnDiscussion>To assure accountability and prevent unauthenticated access, privileged and non-privileged users must utilize multifactor aut...
    Rule Medium Severity
  • SRG-OS-000376-GPOS-00161

    <GroupDescription></GroupDescription>
    Group
  • The AIX operating system must accept and verify Personal Identity Verification (PIV) credentials.

    &lt;VulnDiscussion&gt;The use of PIV credentials facilitates standardization and reduces the risk of unauthorized access. DoD has mandated the use...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • AIX must employ a deny-all, allow-by-exception firewall policy for allowing connections to other systems.

    &lt;VulnDiscussion&gt;Failure to restrict network connectivity only to authorized systems permits inbound connections from malicious systems. It al...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules