III - Administrative Public
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000312-GPOS-00122
Group -
AIX must allow admins to send a message to all the users who logged in currently.
Discretionary Access Control (DAC) is based on the notion that individual users are "owners" of objects and therefore have discretion over who should be authorized to access the object and in which...Rule Medium Severity -
SRG-OS-000312-GPOS-00122
Group -
AIX must allow admins to send a message to a user who logged in currently.
Discretionary Access Control (DAC) is based on the notion that individual users are "owners" of objects and therefore have discretion over who should be authorized to access the object and in which...Rule Medium Severity -
SRG-OS-000033-GPOS-00014
Group -
The AIX SSH daemon must be configured to only use FIPS 140-2 approved ciphers.
Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote access session. Remote access is access to DoD nonpublic information s...Rule Medium Severity -
SRG-OS-000073-GPOS-00041
Group -
The AIX system must have no .netrc files on the system.
Unencrypted passwords for remote FTP servers may be stored in .netrc files. Policy requires passwords be encrypted in storage and not used in access scripts.Rule High Severity -
SRG-OS-000080-GPOS-00048
Group -
AIX must turn on enhanced Role-Based Access Control (RBAC) to isolate security functions from nonsecurity functions, to grant system privileges to other operating system admins, and prohibit user installation of system software without explicit privileged status.
To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-approved PKIs, all DoD systems (e.g., web servers and web portals) must be...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
Group -
If DHCP server is not required on AIX, the DHCP server must be disabled.
The dhcpsd daemon is the DHCP server that serves addresses and configuration information to DHCP clients in the network. To prevent remote attacks this daemon should not be enabled unless there is...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
Group -
The rwalld daemon must be disabled on AIX.
The rwalld service allows remote users to broadcast system wide messages. The service runs as root and should be disabled unless absolutely necessary to prevent attacks.Rule Medium Severity -
SRG-OS-000269-GPOS-00103
Group -
In the event of a system failure, AIX must preserve any information necessary to determine cause of failure and any information necessary to return to operations with least disruption to mission processes.
Failure to a known state can address safety or security in accordance with the mission/business needs of the organization. Failure to a known secure state helps prevent a loss of confidentiality, i...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
The /etc/shells file must exist on AIX systems.
The shells file (or equivalent) lists approved default shells. It helps provide layered defense to the security approach by ensuring users cannot change their default shell to an unauthorized unsec...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
AIX public directories must be the only world-writable directories and world-writable files must be located only in public directories.
World-writable files and directories make it easy for a malicious user to place potentially compromising files on the system. The only authorized public directories are those temporary directories ...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
AIX must be configured to only boot from the system boot device.
The ability to boot from removable media is the same as being able to boot into single user or maintenance mode without a password. This ability could allow a malicious user to boot the system and ...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
AIX must not use removable media as the boot loader.
Malicious users with removable boot media can gain access to a system configured to use removable media as the boot loader.Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
If the AIX host is running an SMTP service, the SMTP greeting must not provide version information.
The version of the SMTP service can be used by attackers to plan an attack based on vulnerabilities present in the specific version.Rule Low Severity -
SRG-OS-000480-GPOS-00227
Group -
AIX must contain no .forward files.
The .forward file allows users to automatically forward mail to another system. Use of .forward files could allow the unauthorized forwarding of mail and could potentially create mail loops which c...Rule Low Severity -
SRG-OS-000480-GPOS-00227
Group -
The sendmail server must have the debug feature disabled on AIX systems.
Debug mode is a feature present in older versions of Sendmail which, if not disabled, may allow an attacker to gain access to a system through the Sendmail service.Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
SMTP service must not have the EXPN or VRFY features active on AIX systems.
The SMTP EXPN function allows an attacker to determine if an account exists on a system, providing significant assistance to a brute force attack on user accounts. EXPN may also provide additional ...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
All global initialization file executable search paths must contain only absolute paths.
Failure to restrict system access to authenticated users negatively impacts operating system security.Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
The SMTP service HELP command must not be enabled on AIX.
The HELP command should be disabled to mask version information. The version of the SMTP service software could be used by attackers to target vulnerabilities present in specific software versions.Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
NIS maps must be protected through hard-to-guess domain names on AIX.
The use of hard-to-guess NIS domain names provides additional protection from unauthorized access to the NIS directory information.Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
The AIX systems access control program must be configured to grant or deny system access to specific hosts.
If the system's access control program is not configured with appropriate rules for allowing and denying access to system network resources, services may be accessible to unauthorized hosts.Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
All AIX files and directories must have a valid group owner.
Failure to restrict system access to authenticated users negatively impacts operating system security.Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
AIX control scripts library search paths must contain only absolute paths.
The library search path environment variable(s) contain a list of directories for the dynamic linker to search to find libraries. If this path includes the current working directory or other relati...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
The control script lists of preloaded libraries must contain only absolute paths on AIX systems.
The library preload list environment variable contains a list of libraries for the dynamic linker to load before loading the libraries required by the binary. If this list contains paths to librari...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
The global initialization file lists of preloaded libraries must contain only absolute paths on AIX.
The library preload list environment variable contains a list of libraries for the dynamic linker to load before loading the libraries required by the binary. If this list contains paths to librari...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
The local initialization file library search paths must contain only absolute paths on AIX.
The library search path environment variable(s) contain a list of directories for the dynamic linker to search to find libraries. If this path includes the current working directory or other relati...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.