Skip to content

II - Mission Support Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000095-GPOS-00049

    Group
  • If DHCP server is not required on AIX, the DHCP server must be disabled.

    The dhcpsd daemon is the DHCP server that serves addresses and configuration information to DHCP clients in the network. To prevent remote attacks this daemon should not be enabled unless there is...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    Group
  • The rwalld daemon must be disabled on AIX.

    The rwalld service allows remote users to broadcast system wide messages. The service runs as root and should be disabled unless absolutely necessary to prevent attacks.
    Rule Medium Severity
  • SRG-OS-000269-GPOS-00103

    Group
  • In the event of a system failure, AIX must preserve any information necessary to determine cause of failure and any information necessary to return to operations with least disruption to mission processes.

    Failure to a known state can address safety or security in accordance with the mission/business needs of the organization. Failure to a known secure state helps prevent a loss of confidentiality, i...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The /etc/shells file must exist on AIX systems.

    The shells file (or equivalent) lists approved default shells. It helps provide layered defense to the security approach by ensuring users cannot change their default shell to an unauthorized unsec...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • AIX public directories must be the only world-writable directories and world-writable files must be located only in public directories.

    World-writable files and directories make it easy for a malicious user to place potentially compromising files on the system. The only authorized public directories are those temporary directories ...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • AIX must be configured to only boot from the system boot device.

    The ability to boot from removable media is the same as being able to boot into single user or maintenance mode without a password. This ability could allow a malicious user to boot the system and ...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • AIX must not use removable media as the boot loader.

    Malicious users with removable boot media can gain access to a system configured to use removable media as the boot loader.
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • If the AIX host is running an SMTP service, the SMTP greeting must not provide version information.

    The version of the SMTP service can be used by attackers to plan an attack based on vulnerabilities present in the specific version.
    Rule Low Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • AIX must contain no .forward files.

    The .forward file allows users to automatically forward mail to another system. Use of .forward files could allow the unauthorized forwarding of mail and could potentially create mail loops which c...
    Rule Low Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The sendmail server must have the debug feature disabled on AIX systems.

    Debug mode is a feature present in older versions of Sendmail which, if not disabled, may allow an attacker to gain access to a system through the Sendmail service.
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules