Skip to content

IBM AIX 7.x Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • AIX ftpd daemon must not be running.

    <VulnDiscussion>The ftp service is used to transfer files from or to a remote machine. The username and passwords are passed over the network...
    Rule High Severity
  • SRG-OS-000373-GPOS-00156

    <GroupDescription></GroupDescription>
    Group
  • AIX log files must be owned by a system account.

    &lt;VulnDiscussion&gt;Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an orga...
    Rule Medium Severity
  • SRG-OS-000206-GPOS-00084

    <GroupDescription></GroupDescription>
    Group
  • AIX log files must be owned by a system group.

    &lt;VulnDiscussion&gt;Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an orga...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    <GroupDescription></GroupDescription>
    Group
  • AIX system files, programs, and directories must be group-owned by a system group.

    &lt;VulnDiscussion&gt;Restricting permissions will protect the files from unauthorized modification.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&l...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The inetd.conf file on AIX must be owned by root.

    &lt;VulnDiscussion&gt;Failure to give ownership of sensitive files or utilities to system groups may provide unauthorized users with the potential ...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • AIX cron and crontab directories must be owned by root or bin.

    &lt;VulnDiscussion&gt;Incorrect ownership of the cron or crontab directories could permit unauthorized users the ability to alter cron jobs and run...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • AIX audio devices must be group-owned by root, sys, bin, or system.

    &lt;VulnDiscussion&gt;Without privileged group owners, audio devices will be vulnerable to being used as eaves-dropping devices by malicious users ...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • AIX time synchronization configuration file must be owned by root.

    &lt;VulnDiscussion&gt;A synchronized system clock is critical for the enforcement of time-based policies and the correlation of logs and audit reco...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • AIX time synchronization configuration file must be group-owned by bin, or system.

    &lt;VulnDiscussion&gt;A synchronized system clock is critical for the enforcement of time-based policies and the correlation of logs and audit reco...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The AIX /etc/group file must be owned by root.

    &lt;VulnDiscussion&gt;The "/etc/group" file contains information regarding groups that are configured on the system. Protection of this file is imp...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The AIX /etc/group file must be group-owned by security.

    &lt;VulnDiscussion&gt;The "/etc/group" file contains information regarding groups that are configured on the system. Protection of this file is imp...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00230

    <GroupDescription></GroupDescription>
    Group
  • All AIX interactive users home directories must be owned by their respective users.

    &lt;VulnDiscussion&gt;System binaries are executed by privileged users as well as system services, and restrictive permissions are necessary to ens...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00230

    <GroupDescription></GroupDescription>
    Group
  • All AIX interactive users home directories must be group-owned by the home directory owner primary group.

    &lt;VulnDiscussion&gt;If the Group Identifier (GID) of the home directory is not the same as the GID of the user, this would allow unauthorized acc...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00230

    <GroupDescription></GroupDescription>
    Group
  • All files and directories contained in users home directories on AIX must be group-owned by a group in which the home directory owner is a member.

    &lt;VulnDiscussion&gt;If the Group Identifier (GID) of the home directory is not the same as the GID of the user, this would allow unauthorized acc...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    <GroupDescription></GroupDescription>
    Group
  • AIX time synchronization configuration file must have mode 0640 or less permissive.

    &lt;VulnDiscussion&gt;A synchronized system clock is critical for the enforcement of time-based policies and the correlation of logs and audit reco...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The AIX /etc/group file must have mode 0644 or less permissive.

    &lt;VulnDiscussion&gt;The "/etc/group" file contains information regarding groups that are configured on the system. Protection of this file is imp...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • AIX must encrypt user data at rest using AIX Encrypted File System (EFS) if it is required.

    &lt;VulnDiscussion&gt;The AIX Encrypted File System (EFS) is a J2 filesystem-level encryption through individual key stores. This allows for file e...
    Rule Medium Severity
  • SRG-OS-000423-GPOS-00187

    <GroupDescription></GroupDescription>
    Group
  • AIX must protect the confidentiality and integrity of transmitted information during preparation for transmission and maintain the confidentiality and integrity of information during reception and disable all non-encryption network access methods.

    &lt;VulnDiscussion&gt;Without protection of the transmitted or received information, confidentiality and integrity may be compromised because unpro...
    Rule Medium Severity
  • SRG-OS-000032-GPOS-00013

    <GroupDescription></GroupDescription>
    Group
  • AIX must monitor and record successful remote logins.

    &lt;VulnDiscussion&gt;Remote access services, such as those providing remote access to network devices and information systems, which lack automate...
    Rule Medium Severity
  • SRG-OS-000032-GPOS-00013

    <GroupDescription></GroupDescription>
    Group
  • AIX must monitor and record unsuccessful remote logins.

    &lt;VulnDiscussion&gt;Remote access services, such as those providing remote access to network devices and information systems, which lack automate...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • On AIX, the SSH server must not permit root logins using remote access programs.

    &lt;VulnDiscussion&gt;Permitting direct root login reduces auditable information about who ran privileged commands on the system and also allows di...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • All AIX shells referenced in passwd file must be listed in /etc/shells file, except any shells specified for the purpose of preventing logins.

    &lt;VulnDiscussion&gt;The /etc/shells file lists approved default shells. It helps provide layered defense to the security approach by ensuring use...
    Rule Medium Severity
  • SRG-OS-000033-GPOS-00014

    <GroupDescription></GroupDescription>
    Group
  • The AIX SSH server must use SSH Protocol 2.

    &lt;VulnDiscussion&gt;Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote...
    Rule Medium Severity
  • SRG-OS-000279-GPOS-00109

    <GroupDescription></GroupDescription>
    Group
  • AIX must config the SSH idle timeout interval.

    &lt;VulnDiscussion&gt;Automatic session termination addresses the termination of user-initiated logical sessions in contrast to the termination of ...
    Rule Medium Severity
  • SRG-OS-000365-GPOS-00152

    <GroupDescription></GroupDescription>
    Group
  • AIX must disable Kerberos Authentication in ssh config file to enforce access restrictions.

    &lt;VulnDiscussion&gt;Without auditing the enforcement of access restrictions against changes to the application configuration, it will be difficul...
    Rule Medium Severity
  • SRG-OS-000373-GPOS-00158

    <GroupDescription></GroupDescription>
    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules