II - Mission Support Public
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000259-GPOS-00100
<GroupDescription></GroupDescription>Group -
All system command files must not have extended ACLs.
<VulnDiscussion>Restricting permissions will protect system command files from unauthorized modification. System command files include files ...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
<GroupDescription></GroupDescription>Group -
All library files must not have extended ACLs.
<VulnDiscussion>Unauthorized access could destroy the integrity of the library files.</VulnDiscussion><FalsePositives></FalseP...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
AIX passwd.nntp file must have mode 0600 or less permissive.
<VulnDiscussion>File permissions more permissive than 0600 for /etc/news/passwd.nntp may allow access to privileged information by system int...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The AIX /etc/group file must not have an extended ACL.
<VulnDiscussion>The "/etc/group" file contains information regarding groups that are configured on the system. Protection of this file is imp...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The AIX ldd command must be disabled.
<VulnDiscussion>The ldd command provides a list of dependent libraries needed by a given binary, which is useful for troubleshooting software...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
AIX NFS server must be configured to restrict file system access to local hosts.
<VulnDiscussion>The NFS access option limits user access to the specified level. This assists in protecting exported file systems. If access ...Rule Medium Severity -
SRG-OS-000480-GPOS-00230
<GroupDescription></GroupDescription>Group -
All AIX users home directories must have mode 0750 or less permissive.
<VulnDiscussion>Excessive permissions on home directories allow unauthorized access to user files.</VulnDiscussion><FalsePositives&g...Rule Medium Severity -
SRG-OS-000480-GPOS-00230
<GroupDescription></GroupDescription>Group -
The AIX user home directories must not have extended ACLs.
<VulnDiscussion>Excessive permissions on home directories allow unauthorized access to user files.</VulnDiscussion><FalsePositives&g...Rule Medium Severity -
SRG-OS-000312-GPOS-00124
<GroupDescription></GroupDescription>Group -
AIX must use Trusted Execution (TE) Check policy.
<VulnDiscussion>Discretionary Access Control (DAC) is based on the notion that individual users are "owners" of objects and therefore have di...Rule Medium Severity -
SRG-OS-000365-GPOS-00152
<GroupDescription></GroupDescription>Group -
AIX must disable trivial file transfer protocol.
<VulnDiscussion>Without auditing the enforcement of access restrictions against changes to the application configuration, it will be difficul...Rule High Severity -
SRG-OS-000368-GPOS-00154
<GroupDescription></GroupDescription>Group -
AIX must employ a deny-all, permit-by-exception policy to allow the execution of authorized software programs.
<VulnDiscussion>Control of program execution is a mechanism used to prevent execution of unauthorized programs. Some operating systems may pr...Rule Medium Severity -
SRG-OS-000437-GPOS-00194
<GroupDescription></GroupDescription>Group -
AIX must remove all software components after updated versions have been installed.
<VulnDiscussion>Previous versions of software components that are not removed from the information system after updates have been installed m...Rule Medium Severity -
SRG-OS-000480-GPOS-00226
<GroupDescription></GroupDescription>Group -
AIX must enforce a delay of at least 4 seconds between login prompts following a failed login attempt.
<VulnDiscussion>Limiting the number of login attempts over a certain time interval reduces the chances that an unauthorized user may gain acc...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
AIX system must restrict the ability to switch to the root user to members of a defined group.
<VulnDiscussion>Configuring a supplemental group for users permitted to switch to the root user prevents unauthorized users from accessing th...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
All AIX Group Identifiers (GIDs) referenced in the /etc/passwd file must be defined in the /etc/group file.
<VulnDiscussion>If a user is assigned the GID of a group not existing on the system, and a group with that GID is subsequently created, the u...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
All AIX files and directories must have a valid owner.
<VulnDiscussion>Unowned files do not directly imply a security problem, but they are generally a sign that something is amiss. They may be ca...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The sticky bit must be set on all public directories on AIX systems.
<VulnDiscussion>Failing to set the sticky bit on public directories allows unauthorized users to delete files in the directory structure. The...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The AIX global initialization files must contain the mesg -n or mesg n commands.
<VulnDiscussion>Command "mesg -n" allows only the root user the permission to send messages to your workstation to avoid having others clutte...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The AIX hosts.lpd file must not contain a + character.
<VulnDiscussion>Having the '+' character in the hosts.lpd (or equivalent) file allows all hosts to use local system print resources.</Vuln...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
AIX sendmail logging must not be set to less than nine in the sendmail.cf file.
<VulnDiscussion>If Sendmail is not configured to log at level 9, system logs may not contain the information necessary for tracking unauthori...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
AIX run control scripts executable search paths must contain only absolute paths.
<VulnDiscussion>The executable search path (typically the PATH environment variable) contains a list of directories for the shell to search t...Rule Medium Severity -
SRG-OS-000074-GPOS-00042
<GroupDescription></GroupDescription>Group -
The AIX rsh daemon must be disabled.
<VulnDiscussion>The rsh daemon permits username and passwords to be passed over the network in clear text.</VulnDiscussion><FalsePos...Rule High Severity -
SRG-OS-000074-GPOS-00042
<GroupDescription></GroupDescription>Group -
The AIX rlogind service must be disabled.
<VulnDiscussion>The rlogin daemon permits username and passwords to be passed over the network in clear text.</VulnDiscussion><False...Rule High Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
The AIX qdaemon must be disabled if local or remote printing is not required.
<VulnDiscussion>The qdaemon program is the printing scheduling daemon that manages the submission of print jobs to the piobe service. To pre...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
If AIX system does not act as a remote print server for other servers, the lpd daemon must be disabled.
<VulnDiscussion>The lpd daemon accepts remote print jobs from other systems. To prevent remote attacks this daemon should not be enabled unl...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.