Skip to content

III - Administrative Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • If DHCP server is not required on AIX, the DHCP server must be disabled.

    &lt;VulnDiscussion&gt;The dhcpsd daemon is the DHCP server that serves addresses and configuration information to DHCP clients in the network. To ...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • The rwalld daemon must be disabled on AIX.

    &lt;VulnDiscussion&gt;The rwalld service allows remote users to broadcast system wide messages. The service runs as root and should be disabled unl...
    Rule Medium Severity
  • SRG-OS-000269-GPOS-00103

    <GroupDescription></GroupDescription>
    Group
  • In the event of a system failure, AIX must preserve any information necessary to determine cause of failure and any information necessary to return to operations with least disruption to mission processes.

    &lt;VulnDiscussion&gt;Failure to a known state can address safety or security in accordance with the mission/business needs of the organization. Fa...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The /etc/shells file must exist on AIX systems.

    &lt;VulnDiscussion&gt;The shells file (or equivalent) lists approved default shells. It helps provide layered defense to the security approach by e...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • AIX public directories must be the only world-writable directories and world-writable files must be located only in public directories.

    &lt;VulnDiscussion&gt;World-writable files and directories make it easy for a malicious user to place potentially compromising files on the system....
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • AIX must be configured to only boot from the system boot device.

    &lt;VulnDiscussion&gt;The ability to boot from removable media is the same as being able to boot into single user or maintenance mode without a pas...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • AIX must not use removable media as the boot loader.

    &lt;VulnDiscussion&gt;Malicious users with removable boot media can gain access to a system configured to use removable media as the boot loader.&l...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • If the AIX host is running an SMTP service, the SMTP greeting must not provide version information.

    &lt;VulnDiscussion&gt;The version of the SMTP service can be used by attackers to plan an attack based on vulnerabilities present in the specific v...
    Rule Low Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • AIX must contain no .forward files.

    &lt;VulnDiscussion&gt;The .forward file allows users to automatically forward mail to another system. Use of .forward files could allow the unautho...
    Rule Low Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The sendmail server must have the debug feature disabled on AIX systems.

    &lt;VulnDiscussion&gt;Debug mode is a feature present in older versions of Sendmail which, if not disabled, may allow an attacker to gain access to...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules