Skip to content

IBM AIX 7.x Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • If GSSAPI authentication is not required on AIX, the SSH daemon must disable GSSAPI authentication.

    <VulnDiscussion>GSSAPI authentication is used to provide additional authentication mechanisms to applications. Allowing GSSAPI authentication...
    Rule Medium Severity
  • SRG-OS-000384-GPOS-00167

    <GroupDescription></GroupDescription>
    Group
  • AIX must setup SSH daemon to disable revoked public keys.

    &lt;VulnDiscussion&gt;Without configuring a local cache of revocation data, there is the potential to allow access to users who are no longer autho...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • AIX SSH daemon must be configured to only use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hash algorithms.

    &lt;VulnDiscussion&gt;DoD information systems are required to use FIPS 140-2 approved cryptographic hash functions.&lt;/VulnDiscussion&gt;&lt;False...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The AIX SSH daemon must be configured for IP filtering.

    &lt;VulnDiscussion&gt;The SSH daemon must be configured for IP filtering to provide a layered defense against connection attempts from unauthorized...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The AIX SSH daemon must not allow compression.

    &lt;VulnDiscussion&gt;If compression is allowed in an SSH connection prior to authentication, vulnerabilities in the compression software could res...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • AIX must turn on SSH daemon privilege separation.

    &lt;VulnDiscussion&gt;SSH daemon privilege separation causes the SSH process to drop root privileges when not needed, which would decrease the impa...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • If bash is used, AIX must display logout messages.

    &lt;VulnDiscussion&gt;If a user cannot explicitly end an operating system session, the session may remain open and be exploited by an attacker; thi...
    Rule Low Severity
  • SRG-OS-000281-GPOS-00111

    <GroupDescription></GroupDescription>
    Group
  • If Bourne / ksh shell is used, AIX must display logout messages.

    &lt;VulnDiscussion&gt;If a user cannot explicitly end an operating system session, the session may remain open and be exploited by an attacker; thi...
    Rule Low Severity
  • SRG-OS-000281-GPOS-00111

    <GroupDescription></GroupDescription>
    Group
  • If csh/tcsh shell is used, AIX must display logout messages.

    &lt;VulnDiscussion&gt;If a user cannot explicitly end an operating system session, the session may remain open and be exploited by an attacker; thi...
    Rule Low Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • AIX must implement a remote syslog server that is documented using site-defined procedures.

    &lt;VulnDiscussion&gt;If a remote log host is in use and it has not been justified and documented, sensitive information could be obtained by unaut...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The AIX syslog daemon must not accept remote messages unless it is a syslog server documented using site-defined procedures.

    &lt;VulnDiscussion&gt;Unintentionally running a syslog server accepting remote messages puts the system at increased risk. Malicious syslog message...
    Rule Medium Severity
  • SRG-OS-000365-GPOS-00152

    <GroupDescription></GroupDescription>
    Group
  • All system command files must not have extended ACLs.

    &lt;VulnDiscussion&gt;Restricting permissions will protect system command files from unauthorized modification. System command files include files ...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    <GroupDescription></GroupDescription>
    Group
  • All library files must not have extended ACLs.

    &lt;VulnDiscussion&gt;Unauthorized access could destroy the integrity of the library files.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalseP...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • AIX must be configured to use syslogd to log events by TCPD.

    &lt;VulnDiscussion&gt;Without auditing the enforcement of access restrictions against changes to the application configuration, it will be difficul...
    Rule Medium Severity
  • SRG-OS-000063-GPOS-00032

    <GroupDescription></GroupDescription>
    Group
  • The AIX audit configuration files must be owned by root.

    &lt;VulnDiscussion&gt;Without the capability to restrict which roles and individuals can select which events are audited, unauthorized personnel ma...
    Rule Medium Severity
  • SRG-OS-000063-GPOS-00032

    <GroupDescription></GroupDescription>
    Group
  • The AIX audit configuration files must be group-owned by audit.

    &lt;VulnDiscussion&gt;Without the capability to restrict which roles and individuals can select which events are audited, unauthorized personnel ma...
    Rule Medium Severity
  • SRG-OS-000063-GPOS-00032

    <GroupDescription></GroupDescription>
    Group
  • The AIX audit configuration files must be set to 640 or less permissive.

    &lt;VulnDiscussion&gt;Without the capability to restrict which roles and individuals can select which events are audited, unauthorized personnel ma...
    Rule Medium Severity
  • SRG-OS-000029-GPOS-00010

    <GroupDescription></GroupDescription>
    Group
  • AIX must automatically lock after 15 minutes of inactivity in the CDE Graphical desktop environment.

    &lt;VulnDiscussion&gt;A session time-out lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinit...
    Rule Medium Severity
  • SRG-OS-000279-GPOS-00109

    <GroupDescription></GroupDescription>
    Group
  • AIX passwd.nntp file must have mode 0600 or less permissive.

    &lt;VulnDiscussion&gt;File permissions more permissive than 0600 for /etc/news/passwd.nntp may allow access to privileged information by system int...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • AIX must set inactivity time-out on login sessions and terminate all login sessions after 10 minutes of inactivity.

    &lt;VulnDiscussion&gt;Automatic session termination addresses the termination of user-initiated logical sessions in contrast to the termination of ...
    Rule Medium Severity
  • SRG-OS-000067-GPOS-00035

    <GroupDescription></GroupDescription>
    Group
  • AIX SSH private host key files must have mode 0600 or less permissive.

    &lt;VulnDiscussion&gt;If the private key is discovered, an attacker can use the key to authenticate as an authorized user and gain access to the ne...
    Rule Medium Severity
  • SRG-OS-000074-GPOS-00042

    <GroupDescription></GroupDescription>
    Group
  • AIX must disable /usr/bin/rcp, /usr/bin/rlogin, /usr/bin/rsh, /usr/bin/rexec and /usr/bin/telnet commands.

    &lt;VulnDiscussion&gt;The listed applications permit the transmission of passwords in plain text. Alternative applications such as SSH, which encr...
    Rule High Severity
  • SRG-OS-000206-GPOS-00084

    <GroupDescription></GroupDescription>
    Group
  • AIX log files must have mode 0640 or less permissive.

    &lt;VulnDiscussion&gt;Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an orga...
    Rule Medium Severity
  • SRG-OS-000206-GPOS-00084

    <GroupDescription></GroupDescription>
    Group
  • AIX log files must not have extended ACLs, except as needed to support authorized software.

    &lt;VulnDiscussion&gt;Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an orga...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    <GroupDescription></GroupDescription>
    Group
  • The sticky bit must be set on all public directories on AIX systems.

    &lt;VulnDiscussion&gt;Failing to set the sticky bit on public directories allows unauthorized users to delete files in the directory structure. The...
    Rule Medium Severity
  • The AIX ldd command must be disabled.

    &lt;VulnDiscussion&gt;The ldd command provides a list of dependent libraries needed by a given binary, which is useful for troubleshooting software...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules