IBM AIX 7.x Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-OS-000312-GPOS-00124
<GroupDescription></GroupDescription>Group -
AIX must use Trusted Execution (TE) Check policy.
<VulnDiscussion>Discretionary Access Control (DAC) is based on the notion that individual users are "owners" of objects and therefore have di...Rule Medium Severity -
SRG-OS-000365-GPOS-00152
<GroupDescription></GroupDescription>Group -
AIX must disable trivial file transfer protocol.
<VulnDiscussion>Without auditing the enforcement of access restrictions against changes to the application configuration, it will be difficul...Rule High Severity -
SRG-OS-000368-GPOS-00154
<GroupDescription></GroupDescription>Group -
AIX must employ a deny-all, permit-by-exception policy to allow the execution of authorized software programs.
<VulnDiscussion>Control of program execution is a mechanism used to prevent execution of unauthorized programs. Some operating systems may pr...Rule Medium Severity -
SRG-OS-000437-GPOS-00194
<GroupDescription></GroupDescription>Group -
AIX must remove all software components after updated versions have been installed.
<VulnDiscussion>Previous versions of software components that are not removed from the information system after updates have been installed m...Rule Medium Severity -
SRG-OS-000480-GPOS-00226
<GroupDescription></GroupDescription>Group -
AIX must enforce a delay of at least 4 seconds between login prompts following a failed login attempt.
<VulnDiscussion>Limiting the number of login attempts over a certain time interval reduces the chances that an unauthorized user may gain acc...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.