Skip to content

II - Mission Support Public

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • AIX must turn on SSH daemon reverse name checking.

    &lt;VulnDiscussion&gt;If reverse name checking is off, SSH may allow a remote attacker to circumvent security policies and attempt to or actually l...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • AIX SSH daemon must perform strict mode checking of home directory configuration files.

    &lt;VulnDiscussion&gt;If other users have access to modify user-specific SSH configuration files, they may be able to log into the system as anothe...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • AIX must turn off X11 forwarding for the SSH daemon.

    &lt;VulnDiscussion&gt;X11 forwarding over SSH allows for the secure remote execution of X11-based applications. This feature can increase the attac...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • AIX must turn off TCP forwarding for the SSH daemon.

    &lt;VulnDiscussion&gt;SSH TCP connection forwarding provides a mechanism to establish TCP connections proxied by the SSH server. This function can ...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00229

    <GroupDescription></GroupDescription>
    Group
  • The AIX SSH daemon must be configured to disable empty passwords.

    &lt;VulnDiscussion&gt;When password authentication is allowed, PermitEmptyPasswords specifies whether the server allows login to accounts with empt...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00229

    <GroupDescription></GroupDescription>
    Group
  • The AIX SSH daemon must be configured to disable user .rhosts files.

    &lt;VulnDiscussion&gt;Trust .rhost file means a compromise on one host can allow an attacker to move trivially to other hosts.&lt;/VulnDiscussion&g...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00229

    <GroupDescription></GroupDescription>
    Group
  • The AIX SSH daemon must be configured to not use host-based authentication.

    &lt;VulnDiscussion&gt;SSH trust relationships mean a compromise on one host can allow an attacker to move trivially to other hosts.&lt;/VulnDiscuss...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00229

    <GroupDescription></GroupDescription>
    Group
  • The AIX SSH daemon must not allow RhostsRSAAuthentication.

    &lt;VulnDiscussion&gt;If SSH permits rhosts RSA authentication, a user may be able to log in based on the keys of the host originating the request ...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00232

    <GroupDescription></GroupDescription>
    Group
  • If AIX SSH daemon is required, the SSH daemon must only listen on the approved listening IP addresses.

    &lt;VulnDiscussion&gt;The SSH daemon should only listen on the approved listening IP addresses. Otherwise the SSH service could be subject to unaut...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • AIX system must require authentication upon booting into single-user and maintenance modes.

    &lt;VulnDiscussion&gt;This prevents attackers with physical access from trivially bypassing security on the machine and gaining root access. Such a...
    Rule Medium Severity
  • SRG-OS-000281-GPOS-00111

    <GroupDescription></GroupDescription>
    Group
  • If bash is used, AIX must display logout messages.

    &lt;VulnDiscussion&gt;If a user cannot explicitly end an operating system session, the session may remain open and be exploited by an attacker; thi...
    Rule Low Severity
  • SRG-OS-000281-GPOS-00111

    <GroupDescription></GroupDescription>
    Group
  • If Bourne / ksh shell is used, AIX must display logout messages.

    &lt;VulnDiscussion&gt;If a user cannot explicitly end an operating system session, the session may remain open and be exploited by an attacker; thi...
    Rule Low Severity
  • SRG-OS-000281-GPOS-00111

    <GroupDescription></GroupDescription>
    Group
  • If csh/tcsh shell is used, AIX must display logout messages.

    &lt;VulnDiscussion&gt;If a user cannot explicitly end an operating system session, the session may remain open and be exploited by an attacker; thi...
    Rule Low Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • AIX must implement a remote syslog server that is documented using site-defined procedures.

    &lt;VulnDiscussion&gt;If a remote log host is in use and it has not been justified and documented, sensitive information could be obtained by unaut...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The AIX syslog daemon must not accept remote messages unless it is a syslog server documented using site-defined procedures.

    &lt;VulnDiscussion&gt;Unintentionally running a syslog server accepting remote messages puts the system at increased risk. Malicious syslog message...
    Rule Medium Severity
  • SRG-OS-000365-GPOS-00152

    <GroupDescription></GroupDescription>
    Group
  • AIX must be configured to use syslogd to log events by TCPD.

    &lt;VulnDiscussion&gt;Without auditing the enforcement of access restrictions against changes to the application configuration, it will be difficul...
    Rule Medium Severity
  • SRG-OS-000063-GPOS-00032

    <GroupDescription></GroupDescription>
    Group
  • The AIX audit configuration files must be owned by root.

    &lt;VulnDiscussion&gt;Without the capability to restrict which roles and individuals can select which events are audited, unauthorized personnel ma...
    Rule Medium Severity
  • SRG-OS-000063-GPOS-00032

    <GroupDescription></GroupDescription>
    Group
  • The AIX audit configuration files must be group-owned by audit.

    &lt;VulnDiscussion&gt;Without the capability to restrict which roles and individuals can select which events are audited, unauthorized personnel ma...
    Rule Medium Severity
  • SRG-OS-000063-GPOS-00032

    <GroupDescription></GroupDescription>
    Group
  • The AIX audit configuration files must be set to 640 or less permissive.

    &lt;VulnDiscussion&gt;Without the capability to restrict which roles and individuals can select which events are audited, unauthorized personnel ma...
    Rule Medium Severity
  • SRG-OS-000029-GPOS-00010

    <GroupDescription></GroupDescription>
    Group
  • AIX must automatically lock after 15 minutes of inactivity in the CDE Graphical desktop environment.

    &lt;VulnDiscussion&gt;A session time-out lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinit...
    Rule Medium Severity
  • SRG-OS-000279-GPOS-00109

    <GroupDescription></GroupDescription>
    Group
  • AIX must set inactivity time-out on login sessions and terminate all login sessions after 10 minutes of inactivity.

    &lt;VulnDiscussion&gt;Automatic session termination addresses the termination of user-initiated logical sessions in contrast to the termination of ...
    Rule Medium Severity
  • SRG-OS-000067-GPOS-00035

    <GroupDescription></GroupDescription>
    Group
  • AIX SSH private host key files must have mode 0600 or less permissive.

    &lt;VulnDiscussion&gt;If the private key is discovered, an attacker can use the key to authenticate as an authorized user and gain access to the ne...
    Rule Medium Severity
  • SRG-OS-000074-GPOS-00042

    <GroupDescription></GroupDescription>
    Group
  • AIX must disable /usr/bin/rcp, /usr/bin/rlogin, /usr/bin/rsh, /usr/bin/rexec and /usr/bin/telnet commands.

    &lt;VulnDiscussion&gt;The listed applications permit the transmission of passwords in plain text. Alternative applications such as SSH, which encr...
    Rule High Severity
  • SRG-OS-000206-GPOS-00084

    <GroupDescription></GroupDescription>
    Group
  • AIX log files must have mode 0640 or less permissive.

    &lt;VulnDiscussion&gt;Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an orga...
    Rule Medium Severity
  • SRG-OS-000206-GPOS-00084

    <GroupDescription></GroupDescription>
    Group
  • AIX log files must not have extended ACLs, except as needed to support authorized software.

    &lt;VulnDiscussion&gt;Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an orga...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules