Skip to content

II - Mission Support Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000480-GPOS-00227

    Group
  • AIX must encrypt user data at rest using AIX Encrypted File System (EFS) if it is required.

    The AIX Encrypted File System (EFS) is a J2 filesystem-level encryption through individual key stores. This allows for file encryption in order to protect confidential data from attackers with phys...
    Rule Medium Severity
  • SRG-OS-000423-GPOS-00187

    Group
  • AIX must protect the confidentiality and integrity of transmitted information during preparation for transmission and maintain the confidentiality and integrity of information during reception and disable all non-encryption network access methods.

    Without protection of the transmitted or received information, confidentiality and integrity may be compromised because unprotected communications can be intercepted and either read or altered. U...
    Rule Medium Severity
  • SRG-OS-000032-GPOS-00013

    Group
  • AIX must monitor and record successful remote logins.

    Remote access services, such as those providing remote access to network devices and information systems, which lack automated monitoring capabilities, increase risk and make remote user access man...
    Rule Medium Severity
  • SRG-OS-000032-GPOS-00013

    Group
  • AIX must monitor and record unsuccessful remote logins.

    Remote access services, such as those providing remote access to network devices and information systems, which lack automated monitoring capabilities, increase risk and make remote user access man...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • On AIX, the SSH server must not permit root logins using remote access programs.

    Permitting direct root login reduces auditable information about who ran privileged commands on the system and also allows direct attack attempts on root's password.
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • All AIX shells referenced in passwd file must be listed in /etc/shells file, except any shells specified for the purpose of preventing logins.

    The /etc/shells file lists approved default shells. It helps provide layered defense to the security approach by ensuring users cannot change their default shell to an unauthorized unsecure shell.
    Rule Medium Severity
  • SRG-OS-000033-GPOS-00014

    Group
  • The AIX SSH server must use SSH Protocol 2.

    Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote access session. Remote access is access to DoD nonpublic information s...
    Rule Medium Severity
  • SRG-OS-000279-GPOS-00109

    Group
  • AIX must config the SSH idle timeout interval.

    Automatic session termination addresses the termination of user-initiated logical sessions in contrast to the termination of network connections that are associated with communications sessions (i....
    Rule Medium Severity
  • SRG-OS-000365-GPOS-00152

    Group
  • AIX must disable Kerberos Authentication in ssh config file to enforce access restrictions.

    Without auditing the enforcement of access restrictions against changes to the application configuration, it will be difficult to identify attempted attacks and an audit trail will not be available...
    Rule Medium Severity
  • SRG-OS-000373-GPOS-00158

    Group
  • If GSSAPI authentication is not required on AIX, the SSH daemon must disable GSSAPI authentication.

    GSSAPI authentication is used to provide additional authentication mechanisms to applications. Allowing GSSAPI authentication through SSH exposes the system's GSSAPI to remote hosts, increasing the...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules