II - Mission Support Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000365-GPOS-00152
Group -
AIX must be configured to use syslogd to log events by TCPD.
Without auditing the enforcement of access restrictions against changes to the application configuration, it will be difficult to identify attempted attacks and an audit trail will not be available...Rule Medium Severity -
SRG-OS-000063-GPOS-00032
Group -
The AIX audit configuration files must be owned by root.
Without the capability to restrict which roles and individuals can select which events are audited, unauthorized personnel may be able to prevent the auditing of critical events. Misconfigured audi...Rule Medium Severity -
SRG-OS-000063-GPOS-00032
Group -
The AIX audit configuration files must be group-owned by audit.
Without the capability to restrict which roles and individuals can select which events are audited, unauthorized personnel may be able to prevent the auditing of critical events. Misconfigured audi...Rule Medium Severity -
SRG-OS-000063-GPOS-00032
Group -
The AIX audit configuration files must be set to 640 or less permissive.
Without the capability to restrict which roles and individuals can select which events are audited, unauthorized personnel may be able to prevent the auditing of critical events. Misconfigured audi...Rule Medium Severity -
SRG-OS-000029-GPOS-00010
Group -
AIX must automatically lock after 15 minutes of inactivity in the CDE Graphical desktop environment.
A session time-out lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the information system but does not log out because of the temporar...Rule Medium Severity -
SRG-OS-000279-GPOS-00109
Group -
AIX must set inactivity time-out on login sessions and terminate all login sessions after 10 minutes of inactivity.
Automatic session termination addresses the termination of user-initiated logical sessions in contrast to the termination of network connections that are associated with communications sessions (i....Rule Medium Severity -
SRG-OS-000067-GPOS-00035
Group -
AIX SSH private host key files must have mode 0600 or less permissive.
If the private key is discovered, an attacker can use the key to authenticate as an authorized user and gain access to the network infrastructure. The cornerstone of the PKI is the private key use...Rule Medium Severity -
SRG-OS-000074-GPOS-00042
Group -
AIX must disable /usr/bin/rcp, /usr/bin/rlogin, /usr/bin/rsh, /usr/bin/rexec and /usr/bin/telnet commands.
The listed applications permit the transmission of passwords in plain text. Alternative applications such as SSH, which encrypt data, should be use instead.Rule High Severity -
SRG-OS-000206-GPOS-00084
Group -
AIX log files must have mode 0640 or less permissive.
Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational state or can identify AIX or platform. Additional...Rule Medium Severity -
SRG-OS-000206-GPOS-00084
Group -
AIX log files must not have extended ACLs, except as needed to support authorized software.
Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational state or can identify AIX or platform. Additional...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.