Skip to content

I - Mission Critical Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000256-GPOS-00097

    <GroupDescription></GroupDescription>
    Group
  • AIX audit tools must be owned by root.

    &lt;VulnDiscussion&gt;Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefo...
    Rule Medium Severity
  • SRG-OS-000256-GPOS-00097

    <GroupDescription></GroupDescription>
    Group
  • AIX audit tools must be group-owned by audit.

    &lt;VulnDiscussion&gt;Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefo...
    Rule Medium Severity
  • SRG-OS-000256-GPOS-00097

    <GroupDescription></GroupDescription>
    Group
  • AIX audit tools must be set to 4550 or less permissive.

    &lt;VulnDiscussion&gt;Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefo...
    Rule Medium Severity
  • SRG-OS-000278-GPOS-00108

    <GroupDescription></GroupDescription>
    Group
  • AIX must verify the hash of audit tools.

    &lt;VulnDiscussion&gt;Protecting the integrity of the tools used for auditing purposes is a critical step toward ensuring the integrity of audit in...
    Rule Medium Severity
  • SRG-OS-000337-GPOS-00129

    <GroupDescription></GroupDescription>
    Group
  • AIX must provide the function for assigned ISSOs or designated SAs to change the auditing to be performed on all operating system components, based on all selectable event criteria in near real time.

    &lt;VulnDiscussion&gt;If authorized individuals do not have the ability to modify auditing parameters in response to a changing threat environment,...
    Rule Medium Severity
  • SRG-OS-000341-GPOS-00132

    <GroupDescription></GroupDescription>
    Group
  • AIX must allocate audit record storage capacity to store at least one weeks worth of audit records, when audit records are not immediately sent to a central audit record storage facility.

    &lt;VulnDiscussion&gt;In order to ensure operating systems have a sufficient storage capacity in which to write the audit logs, operating systems n...
    Rule Medium Severity
  • SRG-OS-000350-GPOS-00138

    <GroupDescription></GroupDescription>
    Group
  • AIX must provide a report generation function that supports on-demand audit review and analysis, on-demand reporting requirements, and after-the-fact investigations of security incidents.

    &lt;VulnDiscussion&gt;The report generation capability must support on-demand review and analysis in order to facilitate the organization's ability...
    Rule Medium Severity
  • SRG-OS-000359-GPOS-00146

    <GroupDescription></GroupDescription>
    Group
  • AIX must record time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT).

    &lt;VulnDiscussion&gt;If time stamps are not consistently applied and there is no common time reference, it is difficult to perform forensic analys...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • AIX audit logs must be rotated daily.

    &lt;VulnDiscussion&gt;Rotate audit logs daily to preserve audit file system space and to conform to the DoD/DISA requirement. If it is not rotated ...
    Rule Medium Severity
  • SRG-OS-000074-GPOS-00042

    <GroupDescription></GroupDescription>
    Group
  • The AIX rexec daemon must not be running.

    &lt;VulnDiscussion&gt;The exec service is used to execute a command sent from a remote server. The username and passwords are passed over the netwo...
    Rule High Severity
  • SRG-OS-000074-GPOS-00042

    <GroupDescription></GroupDescription>
    Group
  • AIX telnet daemon must not be running.

    &lt;VulnDiscussion&gt;This telnet service is used to service remote user connections. This is historically the most commonly used remote access met...
    Rule High Severity
  • SRG-OS-000074-GPOS-00042

    <GroupDescription></GroupDescription>
    Group
  • AIX ftpd daemon must not be running.

    &lt;VulnDiscussion&gt;The ftp service is used to transfer files from or to a remote machine. The username and passwords are passed over the network...
    Rule High Severity
  • SRG-OS-000373-GPOS-00156

    <GroupDescription></GroupDescription>
    Group
  • AIX must remove NOPASSWD tag from sudo config files.

    &lt;VulnDiscussion&gt;sudo command does not require reauthentication if NOPASSWD tag is specified in /etc/sudoers config file, or sudoers files in ...
    Rule High Severity
  • SRG-OS-000373-GPOS-00156

    <GroupDescription></GroupDescription>
    Group
  • AIX must remove !authenticate option from sudo config files.

    &lt;VulnDiscussion&gt;sudo command does not require reauthentication if !authenticate option is specified in /etc/sudoers config file, or config fi...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • AIX must be configured with a default gateway for IPv4 if the system uses IPv4, unless the system is a router.

    &lt;VulnDiscussion&gt;If a system has no default gateway defined, the system is at increased risk of man-in-the-middle, monitoring, and Denial of S...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • IP forwarding for IPv4 must not be enabled on AIX unless the system is a router.

    &lt;VulnDiscussion&gt;IP forwarding permits the kernel to forward packets from one network interface to another. The ability to forward packets bet...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • AIX must be configured with a default gateway for IPv6 if the system uses IPv6 unless the system is a router.

    &lt;VulnDiscussion&gt;If a system has no default gateway defined, the system is at increased risk of man-in-the-middle, monitoring, and Denial of S...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • AIX must not have IP forwarding for IPv6 enabled unless the system is an IPv6 router.

    &lt;VulnDiscussion&gt;If the system is configured for IP forwarding and is not a designated router, it could be used to bypass network security by ...
    Rule Medium Severity
  • SRG-OS-000206-GPOS-00084

    <GroupDescription></GroupDescription>
    Group
  • AIX log files must be owned by a system account.

    &lt;VulnDiscussion&gt;Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an orga...
    Rule Medium Severity
  • SRG-OS-000206-GPOS-00084

    <GroupDescription></GroupDescription>
    Group
  • AIX log files must be owned by a system group.

    &lt;VulnDiscussion&gt;Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an orga...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    <GroupDescription></GroupDescription>
    Group
  • AIX system files, programs, and directories must be group-owned by a system group.

    &lt;VulnDiscussion&gt;Restricting permissions will protect the files from unauthorized modification.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&l...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The inetd.conf file on AIX must be owned by root.

    &lt;VulnDiscussion&gt;Failure to give ownership of sensitive files or utilities to system groups may provide unauthorized users with the potential ...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • AIX cron and crontab directories must be owned by root or bin.

    &lt;VulnDiscussion&gt;Incorrect ownership of the cron or crontab directories could permit unauthorized users the ability to alter cron jobs and run...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • AIX audio devices must be group-owned by root, sys, bin, or system.

    &lt;VulnDiscussion&gt;Without privileged group owners, audio devices will be vulnerable to being used as eaves-dropping devices by malicious users ...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • AIX time synchronization configuration file must be owned by root.

    &lt;VulnDiscussion&gt;A synchronized system clock is critical for the enforcement of time-based policies and the correlation of logs and audit reco...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules