Skip to content

III - Administrative Public

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000002-GPOS-00002

    Group
  • AIX must automatically remove or disable temporary user accounts after 72 hours or sooner.

    If temporary user accounts remain active when no longer needed or for an excessive period, these accounts may be used to gain unauthorized access. To mitigate this risk, automated termination of al...
    Rule Medium Severity
  • SRG-OS-000021-GPOS-00005

    Group
  • AIX must enforce the limit of three consecutive invalid login attempts by a user before the user account is locked and released by an administrator.

    By limiting the number of failed login attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-force attacks, is reduced. Limits are imposed by locking...
    Rule Medium Severity
  • SRG-OS-000027-GPOS-00008

    Group
  • AIX must limit the number of concurrent sessions to 10 for all accounts and/or account types.

    Operating system management includes the ability to control the number of users and user sessions that utilize an operating system. Limiting the number of allowed users and sessions per user is hel...
    Rule Medium Severity
  • SRG-OS-000066-GPOS-00034

    Group
  • If the AIX system is using LDAP for authentication or account information, the LDAP SSL, or TLS connection must require the server provide a certificate and this certificate must have a valid path to a trusted CA.

    Without path validation, an informed trust decision by the relying party cannot be made when presented with any certificate not already explicitly trusted.
    Rule Medium Severity
  • SRG-OS-000073-GPOS-00041

    Group
  • If AIX is using LDAP for authentication or account information, the /etc/ldap.conf file (or equivalent) must not contain passwords.

    Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are not encrypted, they can be plainly read (i.e., clear text) and easily c...
    Rule High Severity
  • SRG-OS-000104-GPOS-00051

    Group
  • All accounts on AIX system must have unique account names.

    To assure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to prevent potential misuse and compromise of the system. Organizational user...
    Rule High Severity
  • SRG-OS-000104-GPOS-00051

    Group
  • All accounts on AIX must be assigned unique User Identification Numbers (UIDs) and must authenticate organizational and non-organizational users (or processes acting on behalf of these users).

    To assure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to prevent potential misuse and compromise of the system. Lack of authenticat...
    Rule High Severity
  • SRG-OS-000104-GPOS-00051

    Group
  • The AIX SYSTEM attribute must not be set to NONE for any account.

    To assure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to prevent potential misuse and compromise of the system. Organizational user...
    Rule High Severity
  • SRG-OS-000109-GPOS-00056

    Group
  • Direct logins to the AIX system must not be permitted to shared accounts, default accounts, application accounts, and utility accounts.

    Shared accounts (accounts where two or more people log in with the same user identification) do not provide identification and authentication. There is no way to provide for non-repudiation or indi...
    Rule Medium Severity
  • SRG-OS-000112-GPOS-00057

    Group
  • AIX must use the SSH server to implement replay-resistant authentication mechanisms for network access to privileged and non-privileged accounts.

    A replay attack may enable an unauthorized user to gain access to the operating system. Authentication sessions between the authenticator and the operating system validating the user credentials mu...
    Rule High Severity
  • SRG-OS-000123-GPOS-00064

    Group
  • The AIX system must automatically remove or disable emergency accounts after the crisis is resolved or 72 hours.

    Emergency accounts are privileged accounts that are established in response to crisis situations where the need for rapid account activation is required. Therefore, emergency account activation may...
    Rule Medium Severity
  • SRG-OS-000001-GPOS-00001

    Group
  • The shipped /etc/security/mkuser.sys file on AIX must not be customized directly.

    The "/etc/security/mkuser.sys" script customizes the new user account when a new user is created, or a user is logging into the system without a home directory. An improper "/etc/security/mkuser.sy...
    Rule Medium Severity
  • SRG-OS-000001-GPOS-00001

    Group
  • The regular users default primary group must be staff (or equivalent) on AIX.

    The /usr/lib/security/mkuser.default file contains the default primary groups for regular and admin users. Setting a system group as the regular users' primary group increases the risk that the reg...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    Group
  • All system files, programs, and directories must be owned by a system account.

    Restricting permissions will protect the files from unauthorized modification.
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    Group
  • AIX device files and directories must only be writable by users with a system account or as configured by the vendor.

    System device files in writable directories could be modified, removed, or used by an unprivileged user to control system hardware.
    Rule Medium Severity
  • SRG-OS-000114-GPOS-00059

    Group
  • AIX must configure the ttys value for all interactive users.

    A user's "ttys" attribute controls from which device(s) the user can authenticate and log in. If the "ttys" attribute is not specified, all terminals can access the user account.
    Rule Medium Severity
  • SRG-OS-000028-GPOS-00009

    Group
  • AIX must provide the lock command to let users retain their session lock until users are reauthenticated.

    All systems are vulnerable if terminals are left logged in and unattended. Leaving system terminals unsecure poses a potential security hazard. To lock the terminal, use the lock command.
    Rule Medium Severity
  • SRG-OS-000028-GPOS-00009

    Group
  • AIX must provide xlock command in the CDE environment to let users retain their sessions lock until users are reauthenticated.

    All systems are vulnerable if terminals are left logged in and unattended. Leaving system terminals unsecure poses a potential security hazard. If the interface is AIXwindows (CDE), use the xlock ...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • AIX system must prevent the root account from directly logging in except from the system console.

    Limiting the root account direct logins to only system consoles protects the root account from direct unauthorized access from a non-console device. A common attack method of potential hackers is ...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • All AIX public directories must be owned by root or an application account.

    If a public directory has the sticky bit set and is not owned by a privileged UID, unauthorized users may be able to modify files created by others. The only authorized public directories are those...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • AIX administrative accounts must not run a web browser, except as needed for local service administration.

    If a web browser flaw is exploited while running as a privileged user, the entire system could be compromised. Specific exceptions for local service administration should be documented in site-de...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • AIX default system accounts (with the exception of root) must not be listed in the cron.allow file or must be included in the cron.deny file, if cron.allow does not exist.

    To centralize the management of privileged account crontabs, of the default system accounts, only root may have a crontab.
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The AIX root account must not have world-writable directories in its executable search path.

    If the root search path contains a world-writable directory, malicious software could be placed in the path by intruders and/or malicious users and inadvertently run by root with all of root's priv...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The Group Identifiers (GIDs) reserved for AIX system accounts must not be assigned to non-system accounts as their primary group GID.

    Reserved GIDs are typically used by system software packages. If non-system groups have GIDs in this range, they may conflict with system software, possibly leading to the group having permissions ...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • UIDs reserved for system accounts must not be assigned to non-system accounts on AIX systems.

    Reserved UIDs are typically used by system software packages. If non-system accounts have UIDs in this range, they may conflict with system software, possibly leading to the user having permissions...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules