III - Administrative Public
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000480-GPOS-00227
Group -
AIX must turn on SSH daemon reverse name checking.
If reverse name checking is off, SSH may allow a remote attacker to circumvent security policies and attempt to or actually login from IP addresses that are not permitted to access resources.Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
AIX SSH daemon must perform strict mode checking of home directory configuration files.
If other users have access to modify user-specific SSH configuration files, they may be able to log into the system as another user.Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
AIX must turn off X11 forwarding for the SSH daemon.
X11 forwarding over SSH allows for the secure remote execution of X11-based applications. This feature can increase the attack surface of an SSH connection and should not be enabled unless needed.Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
AIX must turn off TCP forwarding for the SSH daemon.
SSH TCP connection forwarding provides a mechanism to establish TCP connections proxied by the SSH server. This function can provide similar convenience to a Virtual Private Network (VPN) with the ...Rule Medium Severity -
SRG-OS-000480-GPOS-00229
Group -
The AIX SSH daemon must be configured to disable empty passwords.
When password authentication is allowed, PermitEmptyPasswords specifies whether the server allows login to accounts with empty password strings. If an account has an empty password, anyone could lo...Rule Medium Severity -
SRG-OS-000480-GPOS-00229
Group -
The AIX SSH daemon must be configured to disable user .rhosts files.
Trust .rhost file means a compromise on one host can allow an attacker to move trivially to other hosts.Rule Medium Severity -
SRG-OS-000480-GPOS-00229
Group -
The AIX SSH daemon must be configured to not use host-based authentication.
SSH trust relationships mean a compromise on one host can allow an attacker to move trivially to other hosts.Rule Medium Severity -
SRG-OS-000480-GPOS-00229
Group -
The AIX SSH daemon must not allow RhostsRSAAuthentication.
If SSH permits rhosts RSA authentication, a user may be able to log in based on the keys of the host originating the request and not any user-specific authentication.Rule Medium Severity -
SRG-OS-000480-GPOS-00232
Group -
If AIX SSH daemon is required, the SSH daemon must only listen on the approved listening IP addresses.
The SSH daemon should only listen on the approved listening IP addresses. Otherwise the SSH service could be subject to unauthorized access.Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
AIX system must require authentication upon booting into single-user and maintenance modes.
This prevents attackers with physical access from trivially bypassing security on the machine and gaining root access. Such accesses are further prevented by configuring the bootloader password.Rule Medium Severity -
SRG-OS-000281-GPOS-00111
Group -
If bash is used, AIX must display logout messages.
If a user cannot explicitly end an operating system session, the session may remain open and be exploited by an attacker; this is referred to as a zombie session. Users need to be aware of whether ...Rule Low Severity -
SRG-OS-000281-GPOS-00111
Group -
If Bourne / ksh shell is used, AIX must display logout messages.
If a user cannot explicitly end an operating system session, the session may remain open and be exploited by an attacker; this is referred to as a zombie session. Users need to be aware of whether ...Rule Low Severity -
SRG-OS-000281-GPOS-00111
Group -
If csh/tcsh shell is used, AIX must display logout messages.
If a user cannot explicitly end an operating system session, the session may remain open and be exploited by an attacker; this is referred to as a zombie session. Users need to be aware of whether ...Rule Low Severity -
SRG-OS-000480-GPOS-00227
Group -
AIX must implement a remote syslog server that is documented using site-defined procedures.
If a remote log host is in use and it has not been justified and documented, sensitive information could be obtained by unauthorized users without the administrator’s knowledge. Satisfies: SRG-OS-...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
Group -
The AIX syslog daemon must not accept remote messages unless it is a syslog server documented using site-defined procedures.
Unintentionally running a syslog server accepting remote messages puts the system at increased risk. Malicious syslog messages sent to the server could exploit vulnerabilities in the server softwar...Rule Medium Severity -
SRG-OS-000365-GPOS-00152
Group -
AIX must be configured to use syslogd to log events by TCPD.
Without auditing the enforcement of access restrictions against changes to the application configuration, it will be difficult to identify attempted attacks and an audit trail will not be available...Rule Medium Severity -
SRG-OS-000063-GPOS-00032
Group -
The AIX audit configuration files must be owned by root.
Without the capability to restrict which roles and individuals can select which events are audited, unauthorized personnel may be able to prevent the auditing of critical events. Misconfigured audi...Rule Medium Severity -
SRG-OS-000063-GPOS-00032
Group -
The AIX audit configuration files must be group-owned by audit.
Without the capability to restrict which roles and individuals can select which events are audited, unauthorized personnel may be able to prevent the auditing of critical events. Misconfigured audi...Rule Medium Severity -
SRG-OS-000063-GPOS-00032
Group -
The AIX audit configuration files must be set to 640 or less permissive.
Without the capability to restrict which roles and individuals can select which events are audited, unauthorized personnel may be able to prevent the auditing of critical events. Misconfigured audi...Rule Medium Severity -
SRG-OS-000029-GPOS-00010
Group -
AIX must automatically lock after 15 minutes of inactivity in the CDE Graphical desktop environment.
A session time-out lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the information system but does not log out because of the temporar...Rule Medium Severity -
SRG-OS-000279-GPOS-00109
Group -
AIX must set inactivity time-out on login sessions and terminate all login sessions after 10 minutes of inactivity.
Automatic session termination addresses the termination of user-initiated logical sessions in contrast to the termination of network connections that are associated with communications sessions (i....Rule Medium Severity -
SRG-OS-000067-GPOS-00035
Group -
AIX SSH private host key files must have mode 0600 or less permissive.
If the private key is discovered, an attacker can use the key to authenticate as an authorized user and gain access to the network infrastructure. The cornerstone of the PKI is the private key use...Rule Medium Severity -
SRG-OS-000074-GPOS-00042
Group -
AIX must disable /usr/bin/rcp, /usr/bin/rlogin, /usr/bin/rsh, /usr/bin/rexec and /usr/bin/telnet commands.
The listed applications permit the transmission of passwords in plain text. Alternative applications such as SSH, which encrypt data, should be use instead.Rule High Severity -
SRG-OS-000206-GPOS-00084
Group -
AIX log files must have mode 0640 or less permissive.
Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational state or can identify AIX or platform. Additional...Rule Medium Severity -
SRG-OS-000206-GPOS-00084
Group -
AIX log files must not have extended ACLs, except as needed to support authorized software.
Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational state or can identify AIX or platform. Additional...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.