Skip to content

I - Mission Critical Public

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000480-GPOS-00229

    Group
  • The AIX SSH daemon must be configured to disable user .rhosts files.

    Trust .rhost file means a compromise on one host can allow an attacker to move trivially to other hosts.
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00229

    Group
  • The AIX SSH daemon must be configured to not use host-based authentication.

    SSH trust relationships mean a compromise on one host can allow an attacker to move trivially to other hosts.
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00229

    Group
  • The AIX SSH daemon must not allow RhostsRSAAuthentication.

    If SSH permits rhosts RSA authentication, a user may be able to log in based on the keys of the host originating the request and not any user-specific authentication.
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00232

    Group
  • If AIX SSH daemon is required, the SSH daemon must only listen on the approved listening IP addresses.

    The SSH daemon should only listen on the approved listening IP addresses. Otherwise the SSH service could be subject to unauthorized access.
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • AIX system must require authentication upon booting into single-user and maintenance modes.

    This prevents attackers with physical access from trivially bypassing security on the machine and gaining root access. Such accesses are further prevented by configuring the bootloader password.
    Rule Medium Severity
  • SRG-OS-000281-GPOS-00111

    Group
  • If bash is used, AIX must display logout messages.

    If a user cannot explicitly end an operating system session, the session may remain open and be exploited by an attacker; this is referred to as a zombie session. Users need to be aware of whether ...
    Rule Low Severity
  • SRG-OS-000281-GPOS-00111

    Group
  • If Bourne / ksh shell is used, AIX must display logout messages.

    If a user cannot explicitly end an operating system session, the session may remain open and be exploited by an attacker; this is referred to as a zombie session. Users need to be aware of whether ...
    Rule Low Severity
  • SRG-OS-000281-GPOS-00111

    Group
  • If csh/tcsh shell is used, AIX must display logout messages.

    If a user cannot explicitly end an operating system session, the session may remain open and be exploited by an attacker; this is referred to as a zombie session. Users need to be aware of whether ...
    Rule Low Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • AIX must implement a remote syslog server that is documented using site-defined procedures.

    If a remote log host is in use and it has not been justified and documented, sensitive information could be obtained by unauthorized users without the administrator’s knowledge. Satisfies: SRG-OS-...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The AIX syslog daemon must not accept remote messages unless it is a syslog server documented using site-defined procedures.

    Unintentionally running a syslog server accepting remote messages puts the system at increased risk. Malicious syslog messages sent to the server could exploit vulnerabilities in the server softwar...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules