III - Administrative Classified
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
AIX audio devices must be group-owned by root, sys, bin, or system.
<VulnDiscussion>Without privileged group owners, audio devices will be vulnerable to being used as eaves-dropping devices by malicious users ...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
AIX time synchronization configuration file must be owned by root.
<VulnDiscussion>A synchronized system clock is critical for the enforcement of time-based policies and the correlation of logs and audit reco...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
AIX time synchronization configuration file must be group-owned by bin, or system.
<VulnDiscussion>A synchronized system clock is critical for the enforcement of time-based policies and the correlation of logs and audit reco...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The AIX /etc/group file must be owned by root.
<VulnDiscussion>The "/etc/group" file contains information regarding groups that are configured on the system. Protection of this file is imp...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The AIX /etc/group file must be group-owned by security.
<VulnDiscussion>The "/etc/group" file contains information regarding groups that are configured on the system. Protection of this file is imp...Rule Medium Severity -
SRG-OS-000480-GPOS-00230
<GroupDescription></GroupDescription>Group -
All AIX interactive users home directories must be owned by their respective users.
<VulnDiscussion>System binaries are executed by privileged users as well as system services, and restrictive permissions are necessary to ens...Rule Medium Severity -
SRG-OS-000480-GPOS-00230
<GroupDescription></GroupDescription>Group -
All AIX interactive users home directories must be group-owned by the home directory owner primary group.
<VulnDiscussion>If the Group Identifier (GID) of the home directory is not the same as the GID of the user, this would allow unauthorized acc...Rule Medium Severity -
SRG-OS-000480-GPOS-00230
<GroupDescription></GroupDescription>Group -
All files and directories contained in users home directories on AIX must be group-owned by a group in which the home directory owner is a member.
<VulnDiscussion>If the Group Identifier (GID) of the home directory is not the same as the GID of the user, this would allow unauthorized acc...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
<GroupDescription></GroupDescription>Group -
AIX library files must have mode 0755 or less permissive.
<VulnDiscussion>Unauthorized access could destroy the integrity of the library files.</VulnDiscussion><FalsePositives></FalseP...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Samba packages must be removed from AIX.
<VulnDiscussion>If the smbpasswd file has a mode more permissive than 0600, the smbpasswd file may be maliciously accessed or modified, poten...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
AIX time synchronization configuration file must have mode 0640 or less permissive.
<VulnDiscussion>A synchronized system clock is critical for the enforcement of time-based policies and the correlation of logs and audit reco...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The AIX /etc/group file must have mode 0644 or less permissive.
<VulnDiscussion>The "/etc/group" file contains information regarding groups that are configured on the system. Protection of this file is imp...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
AIX must encrypt user data at rest using AIX Encrypted File System (EFS) if it is required.
<VulnDiscussion>The AIX Encrypted File System (EFS) is a J2 filesystem-level encryption through individual key stores. This allows for file e...Rule Medium Severity -
SRG-OS-000423-GPOS-00187
<GroupDescription></GroupDescription>Group -
AIX must protect the confidentiality and integrity of transmitted information during preparation for transmission and maintain the confidentiality and integrity of information during reception and disable all non-encryption network access methods.
<VulnDiscussion>Without protection of the transmitted or received information, confidentiality and integrity may be compromised because unpro...Rule Medium Severity -
SRG-OS-000032-GPOS-00013
<GroupDescription></GroupDescription>Group -
AIX must monitor and record successful remote logins.
<VulnDiscussion>Remote access services, such as those providing remote access to network devices and information systems, which lack automate...Rule Medium Severity -
SRG-OS-000032-GPOS-00013
<GroupDescription></GroupDescription>Group -
AIX must monitor and record unsuccessful remote logins.
<VulnDiscussion>Remote access services, such as those providing remote access to network devices and information systems, which lack automate...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
On AIX, the SSH server must not permit root logins using remote access programs.
<VulnDiscussion>Permitting direct root login reduces auditable information about who ran privileged commands on the system and also allows di...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
All AIX shells referenced in passwd file must be listed in /etc/shells file, except any shells specified for the purpose of preventing logins.
<VulnDiscussion>The /etc/shells file lists approved default shells. It helps provide layered defense to the security approach by ensuring use...Rule Medium Severity -
SRG-OS-000033-GPOS-00014
<GroupDescription></GroupDescription>Group -
The AIX SSH server must use SSH Protocol 2.
<VulnDiscussion>Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote...Rule Medium Severity -
SRG-OS-000279-GPOS-00109
<GroupDescription></GroupDescription>Group -
AIX must config the SSH idle timeout interval.
<VulnDiscussion>Automatic session termination addresses the termination of user-initiated logical sessions in contrast to the termination of ...Rule Medium Severity -
SRG-OS-000365-GPOS-00152
<GroupDescription></GroupDescription>Group -
AIX must disable Kerberos Authentication in ssh config file to enforce access restrictions.
<VulnDiscussion>Without auditing the enforcement of access restrictions against changes to the application configuration, it will be difficul...Rule Medium Severity -
SRG-OS-000373-GPOS-00158
<GroupDescription></GroupDescription>Group -
If GSSAPI authentication is not required on AIX, the SSH daemon must disable GSSAPI authentication.
<VulnDiscussion>GSSAPI authentication is used to provide additional authentication mechanisms to applications. Allowing GSSAPI authentication...Rule Medium Severity -
SRG-OS-000384-GPOS-00167
<GroupDescription></GroupDescription>Group -
AIX must setup SSH daemon to disable revoked public keys.
<VulnDiscussion>Without configuring a local cache of revocation data, there is the potential to allow access to users who are no longer autho...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
AIX SSH daemon must be configured to only use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hash algorithms.
<VulnDiscussion>DoD information systems are required to use FIPS 140-2 approved cryptographic hash functions.</VulnDiscussion><False...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The AIX SSH daemon must be configured for IP filtering.
<VulnDiscussion>The SSH daemon must be configured for IP filtering to provide a layered defense against connection attempts from unauthorized...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.