I - Mission Critical Classified
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000142-GPOS-00071
<GroupDescription></GroupDescription>Group -
AIX must set Stack Execution Disable (SED) system wide mode to all.
<VulnDiscussion>DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot ac...Rule Medium Severity -
SRG-OS-000420-GPOS-00186
<GroupDescription></GroupDescription>Group -
AIX must protect against or limit the effects of Denial of Service (DoS) attacks by ensuring AIX is implementing rate-limiting measures on impacted network interfaces.
<VulnDiscussion>DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot ac...Rule Medium Severity -
SRG-OS-000312-GPOS-00122
<GroupDescription></GroupDescription>Group -
AIX must allow admins to send a message to all the users who logged in currently.
<VulnDiscussion>Discretionary Access Control (DAC) is based on the notion that individual users are "owners" of objects and therefore have di...Rule Medium Severity -
SRG-OS-000312-GPOS-00122
<GroupDescription></GroupDescription>Group -
AIX must allow admins to send a message to a user who logged in currently.
<VulnDiscussion>Discretionary Access Control (DAC) is based on the notion that individual users are "owners" of objects and therefore have di...Rule Medium Severity -
SRG-OS-000033-GPOS-00014
<GroupDescription></GroupDescription>Group -
The AIX SSH daemon must be configured to only use FIPS 140-2 approved ciphers.
<VulnDiscussion>Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote...Rule Medium Severity -
SRG-OS-000073-GPOS-00041
<GroupDescription></GroupDescription>Group -
The AIX system must have no .netrc files on the system.
<VulnDiscussion>Unencrypted passwords for remote FTP servers may be stored in .netrc files. Policy requires passwords be encrypted in storage...Rule High Severity -
SRG-OS-000080-GPOS-00048
<GroupDescription></GroupDescription>Group -
AIX must turn on enhanced Role-Based Access Control (RBAC) to isolate security functions from nonsecurity functions, to grant system privileges to other operating system admins, and prohibit user installation of system software without explicit privileged status.
<VulnDiscussion>To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-ap...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
If DHCP server is not required on AIX, the DHCP server must be disabled.
<VulnDiscussion>The dhcpsd daemon is the DHCP server that serves addresses and configuration information to DHCP clients in the network. To ...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
The rwalld daemon must be disabled on AIX.
<VulnDiscussion>The rwalld service allows remote users to broadcast system wide messages. The service runs as root and should be disabled unl...Rule Medium Severity -
SRG-OS-000269-GPOS-00103
<GroupDescription></GroupDescription>Group -
In the event of a system failure, AIX must preserve any information necessary to determine cause of failure and any information necessary to return to operations with least disruption to mission processes.
<VulnDiscussion>Failure to a known state can address safety or security in accordance with the mission/business needs of the organization. Fa...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The /etc/shells file must exist on AIX systems.
<VulnDiscussion>The shells file (or equivalent) lists approved default shells. It helps provide layered defense to the security approach by e...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
AIX public directories must be the only world-writable directories and world-writable files must be located only in public directories.
<VulnDiscussion>World-writable files and directories make it easy for a malicious user to place potentially compromising files on the system....Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
AIX must be configured to only boot from the system boot device.
<VulnDiscussion>The ability to boot from removable media is the same as being able to boot into single user or maintenance mode without a pas...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
AIX must not use removable media as the boot loader.
<VulnDiscussion>Malicious users with removable boot media can gain access to a system configured to use removable media as the boot loader.&l...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
If the AIX host is running an SMTP service, the SMTP greeting must not provide version information.
<VulnDiscussion>The version of the SMTP service can be used by attackers to plan an attack based on vulnerabilities present in the specific v...Rule Low Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
AIX must contain no .forward files.
<VulnDiscussion>The .forward file allows users to automatically forward mail to another system. Use of .forward files could allow the unautho...Rule Low Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The sendmail server must have the debug feature disabled on AIX systems.
<VulnDiscussion>Debug mode is a feature present in older versions of Sendmail which, if not disabled, may allow an attacker to gain access to...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
SMTP service must not have the EXPN or VRFY features active on AIX systems.
<VulnDiscussion>The SMTP EXPN function allows an attacker to determine if an account exists on a system, providing significant assistance to ...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
All global initialization file executable search paths must contain only absolute paths.
<VulnDiscussion>Failure to restrict system access to authenticated users negatively impacts operating system security.</VulnDiscussion>...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The SMTP service HELP command must not be enabled on AIX.
<VulnDiscussion>The HELP command should be disabled to mask version information. The version of the SMTP service software could be used by at...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
NIS maps must be protected through hard-to-guess domain names on AIX.
<VulnDiscussion>The use of hard-to-guess NIS domain names provides additional protection from unauthorized access to the NIS directory inform...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The AIX systems access control program must be configured to grant or deny system access to specific hosts.
<VulnDiscussion>If the system's access control program is not configured with appropriate rules for allowing and denying access to system net...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
All AIX files and directories must have a valid group owner.
<VulnDiscussion>Failure to restrict system access to authenticated users negatively impacts operating system security.</VulnDiscussion>...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
AIX control scripts library search paths must contain only absolute paths.
<VulnDiscussion>The library search path environment variable(s) contain a list of directories for the dynamic linker to search to find librar...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The control script lists of preloaded libraries must contain only absolute paths on AIX systems.
<VulnDiscussion>The library preload list environment variable contains a list of libraries for the dynamic linker to load before loading the ...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.