Skip to content
ATO Pathways
Log In
Overview
Search
Catalogs
SCAP
OSCAL
Catalogs
Profiles
Documents
References
Knowledge Base
Platform Documentation
Compliance Dictionary
Platform Changelog
About
Catalogs
XCCDF
IBM AIX 7.x Security Technical Implementation Guide
SRG-OS-000480-GPOS-00229
There must be no .rhosts, .shosts, hosts.equiv, or shosts.equiv files on the AIX system.
There must be no .rhosts, .shosts, hosts.equiv, or shosts.equiv files on the AIX system.
An XCCDF Rule
Details
Profiles
Prose
There must be no .rhosts, .shosts, hosts.equiv, or shosts.equiv files on the AIX system.
Medium Severity
<VulnDiscussion>Trust files are convenient, but when used in conjunction with the remote login services, they can allow unauthenticated access to a system.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>