I - Mission Critical Classified
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
AIX must contain no .forward files.
<VulnDiscussion>The .forward file allows users to automatically forward mail to another system. Use of .forward files could allow the unautho...Rule Low Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The sendmail server must have the debug feature disabled on AIX systems.
<VulnDiscussion>Debug mode is a feature present in older versions of Sendmail which, if not disabled, may allow an attacker to gain access to...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
SMTP service must not have the EXPN or VRFY features active on AIX systems.
<VulnDiscussion>The SMTP EXPN function allows an attacker to determine if an account exists on a system, providing significant assistance to ...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
All global initialization file executable search paths must contain only absolute paths.
<VulnDiscussion>Failure to restrict system access to authenticated users negatively impacts operating system security.</VulnDiscussion>...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The SMTP service HELP command must not be enabled on AIX.
<VulnDiscussion>The HELP command should be disabled to mask version information. The version of the SMTP service software could be used by at...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.
Capacity
Modules