IBM AIX 7.x Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
AIX must turn on SSH daemon privilege separation.
<VulnDiscussion>SSH daemon privilege separation causes the SSH process to drop root privileges when not needed, which would decrease the impa...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
If bash is used, AIX must display logout messages.
<VulnDiscussion>If a user cannot explicitly end an operating system session, the session may remain open and be exploited by an attacker; thi...Rule Low Severity -
SRG-OS-000281-GPOS-00111
<GroupDescription></GroupDescription>Group -
If Bourne / ksh shell is used, AIX must display logout messages.
<VulnDiscussion>If a user cannot explicitly end an operating system session, the session may remain open and be exploited by an attacker; thi...Rule Low Severity -
SRG-OS-000281-GPOS-00111
<GroupDescription></GroupDescription>Group -
If csh/tcsh shell is used, AIX must display logout messages.
<VulnDiscussion>If a user cannot explicitly end an operating system session, the session may remain open and be exploited by an attacker; thi...Rule Low Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
AIX must implement a remote syslog server that is documented using site-defined procedures.
<VulnDiscussion>If a remote log host is in use and it has not been justified and documented, sensitive information could be obtained by unaut...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The AIX syslog daemon must not accept remote messages unless it is a syslog server documented using site-defined procedures.
<VulnDiscussion>Unintentionally running a syslog server accepting remote messages puts the system at increased risk. Malicious syslog message...Rule Medium Severity -
SRG-OS-000365-GPOS-00152
<GroupDescription></GroupDescription>Group -
All system command files must not have extended ACLs.
<VulnDiscussion>Restricting permissions will protect system command files from unauthorized modification. System command files include files ...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
<GroupDescription></GroupDescription>Group -
All library files must not have extended ACLs.
<VulnDiscussion>Unauthorized access could destroy the integrity of the library files.</VulnDiscussion><FalsePositives></FalseP...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
AIX must be configured to use syslogd to log events by TCPD.
<VulnDiscussion>Without auditing the enforcement of access restrictions against changes to the application configuration, it will be difficul...Rule Medium Severity -
SRG-OS-000063-GPOS-00032
<GroupDescription></GroupDescription>Group -
The AIX audit configuration files must be owned by root.
<VulnDiscussion>Without the capability to restrict which roles and individuals can select which events are audited, unauthorized personnel ma...Rule Medium Severity -
SRG-OS-000063-GPOS-00032
<GroupDescription></GroupDescription>Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.