Skip to content

I - Mission Critical Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • AIX must turn off TCP forwarding for the SSH daemon.

    &lt;VulnDiscussion&gt;SSH TCP connection forwarding provides a mechanism to establish TCP connections proxied by the SSH server. This function can ...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00229

    <GroupDescription></GroupDescription>
    Group
  • The AIX SSH daemon must be configured to disable empty passwords.

    &lt;VulnDiscussion&gt;When password authentication is allowed, PermitEmptyPasswords specifies whether the server allows login to accounts with empt...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00229

    <GroupDescription></GroupDescription>
    Group
  • The AIX SSH daemon must be configured to disable user .rhosts files.

    &lt;VulnDiscussion&gt;Trust .rhost file means a compromise on one host can allow an attacker to move trivially to other hosts.&lt;/VulnDiscussion&g...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00229

    <GroupDescription></GroupDescription>
    Group
  • The AIX SSH daemon must be configured to not use host-based authentication.

    &lt;VulnDiscussion&gt;SSH trust relationships mean a compromise on one host can allow an attacker to move trivially to other hosts.&lt;/VulnDiscuss...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00229

    <GroupDescription></GroupDescription>
    Group
  • The AIX SSH daemon must not allow RhostsRSAAuthentication.

    &lt;VulnDiscussion&gt;If SSH permits rhosts RSA authentication, a user may be able to log in based on the keys of the host originating the request ...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00232

    <GroupDescription></GroupDescription>
    Group
  • If AIX SSH daemon is required, the SSH daemon must only listen on the approved listening IP addresses.

    &lt;VulnDiscussion&gt;The SSH daemon should only listen on the approved listening IP addresses. Otherwise the SSH service could be subject to unaut...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • AIX system must require authentication upon booting into single-user and maintenance modes.

    &lt;VulnDiscussion&gt;This prevents attackers with physical access from trivially bypassing security on the machine and gaining root access. Such a...
    Rule Medium Severity
  • SRG-OS-000281-GPOS-00111

    <GroupDescription></GroupDescription>
    Group
  • If bash is used, AIX must display logout messages.

    &lt;VulnDiscussion&gt;If a user cannot explicitly end an operating system session, the session may remain open and be exploited by an attacker; thi...
    Rule Low Severity
  • SRG-OS-000281-GPOS-00111

    <GroupDescription></GroupDescription>
    Group
  • If Bourne / ksh shell is used, AIX must display logout messages.

    &lt;VulnDiscussion&gt;If a user cannot explicitly end an operating system session, the session may remain open and be exploited by an attacker; thi...
    Rule Low Severity
  • SRG-OS-000281-GPOS-00111

    <GroupDescription></GroupDescription>
    Group
  • If csh/tcsh shell is used, AIX must display logout messages.

    &lt;VulnDiscussion&gt;If a user cannot explicitly end an operating system session, the session may remain open and be exploited by an attacker; thi...
    Rule Low Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules