III - Administrative Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000074-GPOS-00042
<GroupDescription></GroupDescription>Group -
AIX root passwords must never be passed over a network in clear text form.
<VulnDiscussion>Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are...Rule High Severity -
SRG-OS-000075-GPOS-00043
<GroupDescription></GroupDescription>Group -
AIX Operating systems must enforce 24 hours/1 day as the minimum password lifetime.
<VulnDiscussion>Enforcing a minimum password lifetime helps to prevent repeated password changes to defeat the password reuse or history enfo...Rule Medium Severity -
SRG-OS-000076-GPOS-00044
<GroupDescription></GroupDescription>Group -
AIX Operating systems must enforce a 60-day maximum password lifetime restriction.
<VulnDiscussion>Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed periodically. If the ...Rule Medium Severity -
SRG-OS-000078-GPOS-00046
<GroupDescription></GroupDescription>Group -
AIX must use Loadable Password Algorithm (LPA) password hashing algorithm.
<VulnDiscussion>The default legacy password hashing algorithm, crypt(), uses only the first 8 characters from the password string, meaning th...Rule High Severity -
SRG-OS-000078-GPOS-00046
<GroupDescription></GroupDescription>Group -
AIX must enforce a minimum 15-character password length.
<VulnDiscussion>The shorter the password, the lower the number of possible combinations that need to be tested before the password is comprom...Rule High Severity -
SRG-OS-000266-GPOS-00101
<GroupDescription></GroupDescription>Group -
AIX must enforce password complexity by requiring that at least one special character be used.
<VulnDiscussion>Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity o...Rule Medium Severity -
SRG-OS-000480-GPOS-00225
<GroupDescription></GroupDescription>Group -
AIX must prevent the use of dictionary words for passwords.
<VulnDiscussion>If the operating system allows the user to select passwords based on dictionary words, then this increases the chances of pas...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The password hashes stored on AIX system must have been generated using a FIPS 140-2 approved cryptographic hashing algorithm.
<VulnDiscussion>Systems must employ cryptographic hashes for passwords using the SHA-2 family of algorithms or FIPS 140-2 approved successors...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
If SNMP service is enabled on AIX, the default SNMP password must not be used in the /etc/snmpd.conf config file.
<VulnDiscussion>Use default SNMP password increases the chance of security vulnerability on SNMP service.</VulnDiscussion><FalsePosi...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
AIX must require passwords to contain no more than three consecutive repeating characters.
<VulnDiscussion>Passwords with excessive repeating characters may be more vulnerable to password-guessing attacks.</VulnDiscussion><...Rule Medium Severity -
SRG-OS-000297-GPOS-00115
<GroupDescription></GroupDescription>Group -
AIX must be able to control the ability of remote login for users.
<VulnDiscussion>Remote access services, such as those providing remote access to network devices and information systems, which lack automate...Rule High Severity -
SRG-OS-000326-GPOS-00126
<GroupDescription></GroupDescription>Group -
NFS file systems on AIX must be mounted with the nosuid option unless the NFS file systems contain approved setuid or setgid programs.
<VulnDiscussion>The nosuid mount option causes the system to not execute setuid files with owner privileges. This option must be used for mou...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
AIX removable media, remote file systems, and any file system not containing approved device files must be mounted with the nodev option.
<VulnDiscussion>The nodev (or equivalent) mount option causes the system to not handle device files as system devices. This option must be us...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
<GroupDescription></GroupDescription>Group -
AIX must produce audit records containing information to establish what the date, time, and type of events that occurred.
<VulnDiscussion>Without establishing what type of events occurred, it would be difficult to establish, correlate, and investigate the events ...Rule Medium Severity -
SRG-OS-000039-GPOS-00017
<GroupDescription></GroupDescription>Group -
AIX must produce audit records containing information to establish where the events occurred.
<VulnDiscussion>Without establishing where events occurred, it is impossible to establish, correlate, and investigate the events leading up t...Rule Medium Severity -
SRG-OS-000040-GPOS-00018
<GroupDescription></GroupDescription>Group -
AIX must produce audit records containing information to establish the source and the identity of any individual or process associated with an event.
<VulnDiscussion>Without establishing the source of the event, it is impossible to establish, correlate, and investigate the events leading up...Rule Medium Severity -
SRG-OS-000041-GPOS-00019
<GroupDescription></GroupDescription>Group -
AIX must produce audit records containing information to establish the outcome of the events.
<VulnDiscussion>Without information about the outcome of events, security personnel cannot make an accurate assessment as to whether an attac...Rule Medium Severity -
SRG-OS-000042-GPOS-00020
<GroupDescription></GroupDescription>Group -
AIX must produce audit records containing the full-text recording of privileged commands.
<VulnDiscussion>Reconstruction of harmful events or forensic analysis is not possible if audit records do not contain enough information. At...Rule Medium Severity -
SRG-OS-000046-GPOS-00022
<GroupDescription></GroupDescription>Group -
AIX must be configured to generate an audit record when 75% of the audit file system is full.
<VulnDiscussion>It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required....Rule Medium Severity -
SRG-OS-000054-GPOS-00025
<GroupDescription></GroupDescription>Group -
AIX must provide the function to filter audit records for events of interest based upon all audit fields within audit records, support on-demand reporting requirements, and an audit reduction function that supports on-demand audit review and analysis and after-the-fact investigations of security incidents.
<VulnDiscussion>The ability to specify the event criteria that are of interest provides the individuals reviewing the logs with the ability t...Rule Medium Severity -
SRG-OS-000057-GPOS-00027
<GroupDescription></GroupDescription>Group -
Audit logs on the AIX system must be owned by root.
<VulnDiscussion>Unauthorized disclosure of audit records can reveal system and configuration data to attackers, thus compromising its confide...Rule Medium Severity -
SRG-OS-000057-GPOS-00027
<GroupDescription></GroupDescription>Group -
Audit logs on the AIX system must be group-owned by system.
<VulnDiscussion>Unauthorized disclosure of audit records can reveal system and configuration data to attackers, thus compromising its confide...Rule Medium Severity -
SRG-OS-000057-GPOS-00027
<GroupDescription></GroupDescription>Group -
Audit logs on the AIX system must be set to 660 or less permissive.
<VulnDiscussion>Unauthorized disclosure of audit records can reveal system and configuration data to attackers, thus compromising its confide...Rule Medium Severity -
SRG-OS-000062-GPOS-00031
<GroupDescription></GroupDescription>Group -
AIX must provide audit record generation functionality for DoD-defined auditable events.
<VulnDiscussion>Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events r...Rule Medium Severity -
SRG-OS-000254-GPOS-00095
<GroupDescription></GroupDescription>Group -
AIX must start audit at boot.
<VulnDiscussion>If auditing is enabled late in the start-up process, the actions of some start-up processes may not be audited. Some audit sy...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.