Skip to content

III - Administrative Public

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000074-GPOS-00042

    Group
  • AIX root passwords must never be passed over a network in clear text form.

    Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are not encrypted, they can be plainly read (i.e., clear text) and easily c...
    Rule High Severity
  • SRG-OS-000075-GPOS-00043

    Group
  • AIX Operating systems must enforce 24 hours/1 day as the minimum password lifetime.

    Enforcing a minimum password lifetime helps to prevent repeated password changes to defeat the password reuse or history enforcement requirement. If users are allowed to immediately and continually...
    Rule Medium Severity
  • SRG-OS-000076-GPOS-00044

    Group
  • AIX Operating systems must enforce a 60-day maximum password lifetime restriction.

    Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed periodically. If the operating system does not limit the lifetime of passwords and force user...
    Rule Medium Severity
  • SRG-OS-000078-GPOS-00046

    Group
  • AIX must use Loadable Password Algorithm (LPA) password hashing algorithm.

    The default legacy password hashing algorithm, crypt(), uses only the first 8 characters from the password string, meaning the user's password is truncated to eight characters. If the password is s...
    Rule High Severity
  • SRG-OS-000078-GPOS-00046

    Group
  • AIX must enforce a minimum 15-character password length.

    The shorter the password, the lower the number of possible combinations that need to be tested before the password is compromised. Password complexity, or strength, is a measure of the effectivene...
    Rule High Severity
  • SRG-OS-000266-GPOS-00101

    Group
  • AIX must enforce password complexity by requiring that at least one special character be used.

    Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity or strength is a measure of the effectiveness of a password in resisting ...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00225

    Group
  • AIX must prevent the use of dictionary words for passwords.

    If the operating system allows the user to select passwords based on dictionary words, then this increases the chances of password compromise by increasing the opportunity for successful guesses an...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The password hashes stored on AIX system must have been generated using a FIPS 140-2 approved cryptographic hashing algorithm.

    Systems must employ cryptographic hashes for passwords using the SHA-2 family of algorithms or FIPS 140-2 approved successors. The use of unapproved algorithms may result in weak password hashes th...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • If SNMP service is enabled on AIX, the default SNMP password must not be used in the /etc/snmpd.conf config file.

    Use default SNMP password increases the chance of security vulnerability on SNMP service.
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • AIX must require passwords to contain no more than three consecutive repeating characters.

    Passwords with excessive repeating characters may be more vulnerable to password-guessing attacks.
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules