I - Mission Critical Public
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000480-GPOS-00227
Group -
AIX time synchronization configuration file must be group-owned by bin, or system.
A synchronized system clock is critical for the enforcement of time-based policies and the correlation of logs and audit records with other systems. If an illicit time source is used for synchroniz...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
The AIX /etc/group file must be owned by root.
The "/etc/group" file contains information regarding groups that are configured on the system. Protection of this file is important for system security.Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
The AIX /etc/group file must be group-owned by security.
The "/etc/group" file contains information regarding groups that are configured on the system. Protection of this file is important for system security.Rule Medium Severity -
SRG-OS-000480-GPOS-00230
Group -
All AIX interactive users home directories must be owned by their respective users.
System binaries are executed by privileged users as well as system services, and restrictive permissions are necessary to ensure that their execution of these programs cannot be co-opted.Rule Medium Severity -
SRG-OS-000480-GPOS-00230
Group -
All AIX interactive users home directories must be group-owned by the home directory owner primary group.
If the Group Identifier (GID) of the home directory is not the same as the GID of the user, this would allow unauthorized access to files.Rule Medium Severity -
SRG-OS-000480-GPOS-00230
Group -
All files and directories contained in users home directories on AIX must be group-owned by a group in which the home directory owner is a member.
If the Group Identifier (GID) of the home directory is not the same as the GID of the user, this would allow unauthorized access to files.Rule Medium Severity -
SRG-OS-000259-GPOS-00100
Group -
AIX library files must have mode 0755 or less permissive.
Unauthorized access could destroy the integrity of the library files.Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
Samba packages must be removed from AIX.
If the smbpasswd file has a mode more permissive than 0600, the smbpasswd file may be maliciously accessed or modified, potentially resulting in the compromise of Samba accounts.Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
AIX time synchronization configuration file must have mode 0640 or less permissive.
A synchronized system clock is critical for the enforcement of time-based policies and the correlation of logs and audit records with other systems. If an illicit time source is used for synchroniz...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
The AIX /etc/group file must have mode 0644 or less permissive.
The "/etc/group" file contains information regarding groups that are configured on the system. Protection of this file is important for system security.Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
AIX must encrypt user data at rest using AIX Encrypted File System (EFS) if it is required.
The AIX Encrypted File System (EFS) is a J2 filesystem-level encryption through individual key stores. This allows for file encryption in order to protect confidential data from attackers with phys...Rule Medium Severity -
SRG-OS-000423-GPOS-00187
Group -
AIX must protect the confidentiality and integrity of transmitted information during preparation for transmission and maintain the confidentiality and integrity of information during reception and disable all non-encryption network access methods.
Without protection of the transmitted or received information, confidentiality and integrity may be compromised because unprotected communications can be intercepted and either read or altered. U...Rule Medium Severity -
SRG-OS-000032-GPOS-00013
Group -
AIX must monitor and record successful remote logins.
Remote access services, such as those providing remote access to network devices and information systems, which lack automated monitoring capabilities, increase risk and make remote user access man...Rule Medium Severity -
SRG-OS-000032-GPOS-00013
Group -
AIX must monitor and record unsuccessful remote logins.
Remote access services, such as those providing remote access to network devices and information systems, which lack automated monitoring capabilities, increase risk and make remote user access man...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
On AIX, the SSH server must not permit root logins using remote access programs.
Permitting direct root login reduces auditable information about who ran privileged commands on the system and also allows direct attack attempts on root's password.Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
All AIX shells referenced in passwd file must be listed in /etc/shells file, except any shells specified for the purpose of preventing logins.
The /etc/shells file lists approved default shells. It helps provide layered defense to the security approach by ensuring users cannot change their default shell to an unauthorized unsecure shell.Rule Medium Severity -
SRG-OS-000033-GPOS-00014
Group -
The AIX SSH server must use SSH Protocol 2.
Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote access session. Remote access is access to DoD nonpublic information s...Rule Medium Severity -
SRG-OS-000279-GPOS-00109
Group -
AIX must config the SSH idle timeout interval.
Automatic session termination addresses the termination of user-initiated logical sessions in contrast to the termination of network connections that are associated with communications sessions (i....Rule Medium Severity -
SRG-OS-000365-GPOS-00152
Group -
AIX must disable Kerberos Authentication in ssh config file to enforce access restrictions.
Without auditing the enforcement of access restrictions against changes to the application configuration, it will be difficult to identify attempted attacks and an audit trail will not be available...Rule Medium Severity -
SRG-OS-000373-GPOS-00158
Group -
If GSSAPI authentication is not required on AIX, the SSH daemon must disable GSSAPI authentication.
GSSAPI authentication is used to provide additional authentication mechanisms to applications. Allowing GSSAPI authentication through SSH exposes the system's GSSAPI to remote hosts, increasing the...Rule Medium Severity -
SRG-OS-000384-GPOS-00167
Group -
AIX must setup SSH daemon to disable revoked public keys.
Without configuring a local cache of revocation data, there is the potential to allow access to users who are no longer authorized (users with revoked certificates).Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
AIX SSH daemon must be configured to only use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hash algorithms.
DoD information systems are required to use FIPS 140-2 approved cryptographic hash functions.Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
The AIX SSH daemon must be configured for IP filtering.
The SSH daemon must be configured for IP filtering to provide a layered defense against connection attempts from unauthorized addresses.Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
The AIX SSH daemon must not allow compression.
If compression is allowed in an SSH connection prior to authentication, vulnerabilities in the compression software could result in compromise of the system from an unauthenticated connection, pote...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
AIX must turn on SSH daemon privilege separation.
SSH daemon privilege separation causes the SSH process to drop root privileges when not needed, which would decrease the impact of software vulnerabilities in the unprivileged section.Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.