IBM AIX 7.x Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
The AIX SSH daemon must be configured to disable empty passwords.
<VulnDiscussion>When password authentication is allowed, PermitEmptyPasswords specifies whether the server allows login to accounts with empt...Rule Medium Severity -
SRG-OS-000480-GPOS-00229
<GroupDescription></GroupDescription>Group -
The AIX SSH daemon must be configured to disable user .rhosts files.
<VulnDiscussion>Trust .rhost file means a compromise on one host can allow an attacker to move trivially to other hosts.</VulnDiscussion&g...Rule Medium Severity -
SRG-OS-000480-GPOS-00229
<GroupDescription></GroupDescription>Group -
The AIX SSH daemon must be configured to not use host-based authentication.
<VulnDiscussion>SSH trust relationships mean a compromise on one host can allow an attacker to move trivially to other hosts.</VulnDiscuss...Rule Medium Severity -
SRG-OS-000480-GPOS-00229
<GroupDescription></GroupDescription>Group -
The AIX SSH daemon must not allow RhostsRSAAuthentication.
<VulnDiscussion>If SSH permits rhosts RSA authentication, a user may be able to log in based on the keys of the host originating the request ...Rule Medium Severity -
SRG-OS-000480-GPOS-00232
<GroupDescription></GroupDescription>Group -
If AIX SSH daemon is required, the SSH daemon must only listen on the approved listening IP addresses.
<VulnDiscussion>The SSH daemon should only listen on the approved listening IP addresses. Otherwise the SSH service could be subject to unaut...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.