Skip to content

I - Mission Critical Public

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000074-GPOS-00042

    Group
  • AIX root passwords must never be passed over a network in clear text form.

    Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are not encrypted, they can be plainly read (i.e., clear text) and easily c...
    Rule High Severity
  • SRG-OS-000075-GPOS-00043

    Group
  • AIX Operating systems must enforce 24 hours/1 day as the minimum password lifetime.

    Enforcing a minimum password lifetime helps to prevent repeated password changes to defeat the password reuse or history enforcement requirement. If users are allowed to immediately and continually...
    Rule Medium Severity
  • SRG-OS-000076-GPOS-00044

    Group
  • AIX Operating systems must enforce a 60-day maximum password lifetime restriction.

    Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed periodically. If the operating system does not limit the lifetime of passwords and force user...
    Rule Medium Severity
  • SRG-OS-000078-GPOS-00046

    Group
  • AIX must use Loadable Password Algorithm (LPA) password hashing algorithm.

    The default legacy password hashing algorithm, crypt(), uses only the first 8 characters from the password string, meaning the user's password is truncated to eight characters. If the password is s...
    Rule High Severity
  • SRG-OS-000078-GPOS-00046

    Group
  • AIX must enforce a minimum 15-character password length.

    The shorter the password, the lower the number of possible combinations that need to be tested before the password is compromised. Password complexity, or strength, is a measure of the effectivene...
    Rule High Severity
  • SRG-OS-000266-GPOS-00101

    Group
  • AIX must enforce password complexity by requiring that at least one special character be used.

    Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity or strength is a measure of the effectiveness of a password in resisting ...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00225

    Group
  • AIX must prevent the use of dictionary words for passwords.

    If the operating system allows the user to select passwords based on dictionary words, then this increases the chances of password compromise by increasing the opportunity for successful guesses an...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The password hashes stored on AIX system must have been generated using a FIPS 140-2 approved cryptographic hashing algorithm.

    Systems must employ cryptographic hashes for passwords using the SHA-2 family of algorithms or FIPS 140-2 approved successors. The use of unapproved algorithms may result in weak password hashes th...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • If SNMP service is enabled on AIX, the default SNMP password must not be used in the /etc/snmpd.conf config file.

    Use default SNMP password increases the chance of security vulnerability on SNMP service.
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • AIX must require passwords to contain no more than three consecutive repeating characters.

    Passwords with excessive repeating characters may be more vulnerable to password-guessing attacks.
    Rule Medium Severity
  • SRG-OS-000297-GPOS-00115

    Group
  • AIX must be able to control the ability of remote login for users.

    Remote access services, such as those providing remote access to network devices and information systems, which lack automated control capabilities, increase risk and make remote user access manage...
    Rule High Severity
  • SRG-OS-000326-GPOS-00126

    Group
  • NFS file systems on AIX must be mounted with the nosuid option unless the NFS file systems contain approved setuid or setgid programs.

    The nosuid mount option causes the system to not execute setuid files with owner privileges. This option must be used for mounting any file system not containing approved setuid files. Executing se...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • AIX removable media, remote file systems, and any file system not containing approved device files must be mounted with the nodev option.

    The nodev (or equivalent) mount option causes the system to not handle device files as system devices. This option must be used for mounting any file system not containing approved device files. De...
    Rule Medium Severity
  • SRG-OS-000037-GPOS-00015

    Group
  • AIX must produce audit records containing information to establish what the date, time, and type of events that occurred.

    Without establishing what type of events occurred, it would be difficult to establish, correlate, and investigate the events leading up to an outage or attack. Audit record content that may be nec...
    Rule Medium Severity
  • SRG-OS-000039-GPOS-00017

    Group
  • AIX must produce audit records containing information to establish where the events occurred.

    Without establishing where events occurred, it is impossible to establish, correlate, and investigate the events leading up to an outage or attack. In order to compile an accurate risk assessment ...
    Rule Medium Severity
  • SRG-OS-000040-GPOS-00018

    Group
  • AIX must produce audit records containing information to establish the source and the identity of any individual or process associated with an event.

    Without establishing the source of the event, it is impossible to establish, correlate, and investigate the events leading up to an outage or attack. Without information that establishes the ident...
    Rule Medium Severity
  • SRG-OS-000041-GPOS-00019

    Group
  • AIX must produce audit records containing information to establish the outcome of the events.

    Without information about the outcome of events, security personnel cannot make an accurate assessment as to whether an attack was successful or if changes were made to the security state of the sy...
    Rule Medium Severity
  • SRG-OS-000042-GPOS-00020

    Group
  • AIX must produce audit records containing the full-text recording of privileged commands.

    Reconstruction of harmful events or forensic analysis is not possible if audit records do not contain enough information. At a minimum, the organization must audit the full-text recording of privi...
    Rule Medium Severity
  • SRG-OS-000046-GPOS-00022

    Group
  • AIX must be configured to generate an audit record when 75% of the audit file system is full.

    It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required. Without this notification, the security personnel may be unaware of an ...
    Rule Medium Severity
  • SRG-OS-000054-GPOS-00025

    Group
  • AIX must provide the function to filter audit records for events of interest based upon all audit fields within audit records, support on-demand reporting requirements, and an audit reduction function that supports on-demand audit review and analysis and after-the-fact investigations of security incidents.

    The ability to specify the event criteria that are of interest provides the individuals reviewing the logs with the ability to quickly isolate and identify these events without having to review ent...
    Rule Medium Severity
  • SRG-OS-000057-GPOS-00027

    Group
  • Audit logs on the AIX system must be owned by root.

    Unauthorized disclosure of audit records can reveal system and configuration data to attackers, thus compromising its confidentiality. Audit information includes all information (e.g., audit recor...
    Rule Medium Severity
  • SRG-OS-000057-GPOS-00027

    Group
  • Audit logs on the AIX system must be group-owned by system.

    Unauthorized disclosure of audit records can reveal system and configuration data to attackers, thus compromising its confidentiality. Audit information includes all information (e.g., audit recor...
    Rule Medium Severity
  • SRG-OS-000057-GPOS-00027

    Group
  • Audit logs on the AIX system must be set to 660 or less permissive.

    Unauthorized disclosure of audit records can reveal system and configuration data to attackers, thus compromising its confidentiality. Audit information includes all information (e.g., audit recor...
    Rule Medium Severity
  • SRG-OS-000062-GPOS-00031

    Group
  • AIX must provide audit record generation functionality for DoD-defined auditable events.

    Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one. Audit rec...
    Rule Medium Severity
  • SRG-OS-000254-GPOS-00095

    Group
  • AIX must start audit at boot.

    If auditing is enabled late in the start-up process, the actions of some start-up processes may not be audited. Some audit systems also maintain state information only available if auditing is enab...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules