Skip to content

II - Mission Support Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000378-GPOS-00163

    Group
  • If automated file system mounting tool is not required on AIX, it must be disabled.

    Automated file system mounting tools may provide unprivileged users with the ability to access local media and network shares. If this access is not necessary for the system’s operation, it must be...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • AIX process core dumps must be disabled.

    A core dump includes a memory image taken at the time the operating system terminates an application. The memory image could contain sensitive data and is generally useful only for developers tryin...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • AIX kernel core dumps must be disabled unless needed.

    Kernel core dumps may contain the full contents of system memory at the time of the crash. Kernel core dumps may consume a considerable amount of disk space and may result in Denial of Service by e...
    Rule Medium Severity
  • SRG-OS-000142-GPOS-00071

    Group
  • AIX must set Stack Execution Disable (SED) system wide mode to all.

    DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot accomplish its mission or must operate at degraded capacity. Managing ex...
    Rule Medium Severity
  • SRG-OS-000420-GPOS-00186

    Group
  • AIX must protect against or limit the effects of Denial of Service (DoS) attacks by ensuring AIX is implementing rate-limiting measures on impacted network interfaces.

    DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot accomplish its mission or must operate at degraded capacity. This require...
    Rule Medium Severity
  • SRG-OS-000312-GPOS-00122

    Group
  • AIX must allow admins to send a message to all the users who logged in currently.

    Discretionary Access Control (DAC) is based on the notion that individual users are "owners" of objects and therefore have discretion over who should be authorized to access the object and in which...
    Rule Medium Severity
  • SRG-OS-000312-GPOS-00122

    Group
  • AIX must allow admins to send a message to a user who logged in currently.

    Discretionary Access Control (DAC) is based on the notion that individual users are "owners" of objects and therefore have discretion over who should be authorized to access the object and in which...
    Rule Medium Severity
  • SRG-OS-000033-GPOS-00014

    Group
  • The AIX SSH daemon must be configured to only use FIPS 140-2 approved ciphers.

    Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote access session. Remote access is access to DoD nonpublic information s...
    Rule Medium Severity
  • SRG-OS-000073-GPOS-00041

    Group
  • The AIX system must have no .netrc files on the system.

    Unencrypted passwords for remote FTP servers may be stored in .netrc files. Policy requires passwords be encrypted in storage and not used in access scripts.
    Rule High Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • AIX must turn on enhanced Role-Based Access Control (RBAC) to isolate security functions from nonsecurity functions, to grant system privileges to other operating system admins, and prohibit user installation of system software without explicit privileged status.

    To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-approved PKIs, all DoD systems (e.g., web servers and web portals) must be...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules