I - Mission Critical Public
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000256-GPOS-00097
Group -
AIX audit tools must be owned by root.
Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tools is necessary to prevent unauthorized operatio...Rule Medium Severity -
SRG-OS-000256-GPOS-00097
Group -
AIX audit tools must be group-owned by audit.
Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tools is necessary to prevent unauthorized operatio...Rule Medium Severity -
SRG-OS-000256-GPOS-00097
Group -
AIX audit tools must be set to 4550 or less permissive.
Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tools is necessary to prevent unauthorized operatio...Rule Medium Severity -
SRG-OS-000278-GPOS-00108
Group -
AIX must verify the hash of audit tools.
Protecting the integrity of the tools used for auditing purposes is a critical step toward ensuring the integrity of audit information. Audit information includes all information (e.g., audit recor...Rule Medium Severity -
SRG-OS-000337-GPOS-00129
Group -
AIX must provide the function for assigned ISSOs or designated SAs to change the auditing to be performed on all operating system components, based on all selectable event criteria in near real time.
If authorized individuals do not have the ability to modify auditing parameters in response to a changing threat environment, the organization may not be able to effectively respond, and important ...Rule Medium Severity -
SRG-OS-000341-GPOS-00132
Group -
AIX must allocate audit record storage capacity to store at least one weeks worth of audit records, when audit records are not immediately sent to a central audit record storage facility.
In order to ensure operating systems have a sufficient storage capacity in which to write the audit logs, operating systems need to be able to allocate audit record storage capacity. The task of a...Rule Medium Severity -
SRG-OS-000350-GPOS-00138
Group -
AIX must provide a report generation function that supports on-demand audit review and analysis, on-demand reporting requirements, and after-the-fact investigations of security incidents.
The report generation capability must support on-demand review and analysis in order to facilitate the organization's ability to generate incident reports, as needed, to better handle larger-scale ...Rule Medium Severity -
SRG-OS-000359-GPOS-00146
Group -
AIX must record time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT).
If time stamps are not consistently applied and there is no common time reference, it is difficult to perform forensic analysis. Time stamps generated by AIX include date and time. Time is commonl...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
AIX audit logs must be rotated daily.
Rotate audit logs daily to preserve audit file system space and to conform to the DoD/DISA requirement. If it is not rotated daily and moved to another location, then there is more of a chance for ...Rule Medium Severity -
SRG-OS-000074-GPOS-00042
Group -
The AIX rexec daemon must not be running.
The exec service is used to execute a command sent from a remote server. The username and passwords are passed over the network in clear text and therefore insecurely. Unless required the rexecd da...Rule High Severity -
SRG-OS-000074-GPOS-00042
Group -
AIX telnet daemon must not be running.
This telnet service is used to service remote user connections. This is historically the most commonly used remote access method for UNIX servers. The username and passwords are passed over the net...Rule High Severity -
SRG-OS-000074-GPOS-00042
Group -
AIX ftpd daemon must not be running.
The ftp service is used to transfer files from or to a remote machine. The username and passwords are passed over the network in clear text and therefore insecurely. Remote file transfer, if requir...Rule High Severity -
SRG-OS-000373-GPOS-00156
Group -
AIX must remove NOPASSWD tag from sudo config files.
sudo command does not require reauthentication if NOPASSWD tag is specified in /etc/sudoers config file, or sudoers files in /etc/sudoers.d/ directory. With this tag in sudoers file, users are not ...Rule High Severity -
SRG-OS-000373-GPOS-00156
Group -
AIX must remove !authenticate option from sudo config files.
sudo command does not require reauthentication if !authenticate option is specified in /etc/sudoers config file, or config files in /etc/sudoers.d/ directory. With this tag in sudoers, users are no...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
AIX must be configured with a default gateway for IPv4 if the system uses IPv4, unless the system is a router.
If a system has no default gateway defined, the system is at increased risk of man-in-the-middle, monitoring, and Denial of Service attacks.Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
IP forwarding for IPv4 must not be enabled on AIX unless the system is a router.
IP forwarding permits the kernel to forward packets from one network interface to another. The ability to forward packets between two networks is only appropriate for systems acting as routers.Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
AIX must be configured with a default gateway for IPv6 if the system uses IPv6 unless the system is a router.
If a system has no default gateway defined, the system is at increased risk of man-in-the-middle, monitoring, and Denial of Service attacks.Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
AIX must not have IP forwarding for IPv6 enabled unless the system is an IPv6 router.
If the system is configured for IP forwarding and is not a designated router, it could be used to bypass network security by providing a path for communication not filtered by network devices.Rule Medium Severity -
SRG-OS-000206-GPOS-00084
Group -
AIX log files must be owned by a system account.
Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational state or can identify AIX or platform. Additional...Rule Medium Severity -
SRG-OS-000206-GPOS-00084
Group -
AIX log files must be owned by a system group.
Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational state or can identify AIX or platform. Additional...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
Group -
AIX system files, programs, and directories must be group-owned by a system group.
Restricting permissions will protect the files from unauthorized modification.Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
The inetd.conf file on AIX must be owned by root.
Failure to give ownership of sensitive files or utilities to system groups may provide unauthorized users with the potential to access sensitive information or change the system configuration which...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
AIX cron and crontab directories must be owned by root or bin.
Incorrect ownership of the cron or crontab directories could permit unauthorized users the ability to alter cron jobs and run automated jobs as privileged users. Failure to give ownership of cron o...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
AIX audio devices must be group-owned by root, sys, bin, or system.
Without privileged group owners, audio devices will be vulnerable to being used as eaves-dropping devices by malicious users or intruders to possibly listen to conversations containing sensitive in...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
AIX time synchronization configuration file must be owned by root.
A synchronized system clock is critical for the enforcement of time-based policies and the correlation of logs and audit records with other systems. If an illicit time source is used for synchroniz...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.