II - Mission Support Classified
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000123-GPOS-00064
Group -
The AIX system must automatically remove or disable emergency accounts after the crisis is resolved or 72 hours.
Emergency accounts are privileged accounts that are established in response to crisis situations where the need for rapid account activation is required. Therefore, emergency account activation may...Rule Medium Severity -
SRG-OS-000001-GPOS-00001
Group -
The shipped /etc/security/mkuser.sys file on AIX must not be customized directly.
The "/etc/security/mkuser.sys" script customizes the new user account when a new user is created, or a user is logging into the system without a home directory. An improper "/etc/security/mkuser.sy...Rule Medium Severity -
SRG-OS-000001-GPOS-00001
Group -
The regular users default primary group must be staff (or equivalent) on AIX.
The /usr/lib/security/mkuser.default file contains the default primary groups for regular and admin users. Setting a system group as the regular users' primary group increases the risk that the reg...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
Group -
All system files, programs, and directories must be owned by a system account.
Restricting permissions will protect the files from unauthorized modification.Rule Medium Severity -
SRG-OS-000259-GPOS-00100
Group -
AIX device files and directories must only be writable by users with a system account or as configured by the vendor.
System device files in writable directories could be modified, removed, or used by an unprivileged user to control system hardware.Rule Medium Severity -
SRG-OS-000114-GPOS-00059
Group -
AIX must configure the ttys value for all interactive users.
A user's "ttys" attribute controls from which device(s) the user can authenticate and log in. If the "ttys" attribute is not specified, all terminals can access the user account.Rule Medium Severity -
SRG-OS-000028-GPOS-00009
Group -
AIX must provide the lock command to let users retain their session lock until users are reauthenticated.
All systems are vulnerable if terminals are left logged in and unattended. Leaving system terminals unsecure poses a potential security hazard. To lock the terminal, use the lock command.Rule Medium Severity -
SRG-OS-000028-GPOS-00009
Group -
AIX must provide xlock command in the CDE environment to let users retain their sessions lock until users are reauthenticated.
All systems are vulnerable if terminals are left logged in and unattended. Leaving system terminals unsecure poses a potential security hazard. If the interface is AIXwindows (CDE), use the xlock ...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
AIX system must prevent the root account from directly logging in except from the system console.
Limiting the root account direct logins to only system consoles protects the root account from direct unauthorized access from a non-console device. A common attack method of potential hackers is ...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
All AIX public directories must be owned by root or an application account.
If a public directory has the sticky bit set and is not owned by a privileged UID, unauthorized users may be able to modify files created by others. The only authorized public directories are those...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.