IBM AIX 7.x Security Technical Implementation Guide

Overview

VersionDateFinding Count (283)Downloads
32024-08-16CAT I (High): 26CAT II (Medium): 252CAT III (Low): 5
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.
ClassifiedPublicSensitive
I - Mission Critical ClassifiedI - Mission Critical PublicI - Mission Critical Sensitive
II - Mission Support ClassifiedII - Mission Support PublicII - Mission Support Sensitive
III - Administrative ClassifiedIII - Administrative PublicIII - Administrative Sensitive

Findings - All

Finding IDSeverityTitleDescription
V-215174
LOWMEDIUMHIGH
If AIX is using LDAP for authentication or account information, the /etc/ldap.conf file (or equivalent) must not contain passwords.Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are not encrypted, they can ...
V-215175
LOWMEDIUMHIGH
All accounts on AIX system must have unique account names.To assure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to prevent potential misuse and...
V-215176
LOWMEDIUMHIGH
All accounts on AIX must be assigned unique User Identification Numbers (UIDs) and must authenticate organizational and non-organizational users (or processes acting on behalf of these users).To assure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to prevent potential misuse and...
V-215177
LOWMEDIUMHIGH
The AIX SYSTEM attribute must not be set to NONE for any account.To assure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to prevent potential misuse and...
V-215179
LOWMEDIUMHIGH
AIX must use the SSH server to implement replay-resistant authentication mechanisms for network access to privileged and non-privileged accounts.A replay attack may enable an unauthorized user to gain access to the operating system. Authentication sessions between the authenticator and the oper...
V-215197
LOWMEDIUMHIGH
AIX must not have accounts configured with blank or null passwords.If an account is configured for password authentication but does not have an assigned password, it may be possible to log into the account without aut...
V-215204
LOWMEDIUMHIGH
IF LDAP is used, AIX LDAP client must use SSL to authenticate with LDAP server.While LDAP client's authentication type is ldap_auth (server-side authentication), the client sends password to the server in clear text for authentic...
V-215213
LOWMEDIUMHIGH
AIX must employ strong authenticators in the establishment of nonlocal maintenance and diagnostic sessions.If maintenance tools are used by unauthorized personnel, they may accidentally or intentionally damage or compromise the system. The act of managing s...
V-215217
LOWMEDIUMHIGH
AIX must enforce password complexity by requiring that at least one upper-case character be used.Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure...
V-215218
LOWMEDIUMHIGH
AIX must enforce password complexity by requiring that at least one lower-case character be used.Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure...
V-215219
LOWMEDIUMHIGH
AIX must enforce password complexity by requiring that at least one numeric character be used.Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure...
V-215220
LOWMEDIUMHIGH
AIX must require the change of at least 50% of the total number of characters when passwords are changed.If the operating system allows the user to consecutively reuse extensive portions of passwords, this increases the chances of password compromise by i...
V-215221
LOWMEDIUMHIGH
AIX root passwords must never be passed over a network in clear text form.Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are not encrypted, they can ...
V-215225
LOWMEDIUMHIGH
AIX must use Loadable Password Algorithm (LPA) password hashing algorithm.The default legacy password hashing algorithm, crypt(), uses only the first 8 characters from the password string, meaning the user's password is trun...
V-215226
LOWMEDIUMHIGH
AIX must enforce a minimum 15-character password length.The shorter the password, the lower the number of possible combinations that need to be tested before the password is compromised. Password complexit...
V-215233
LOWMEDIUMHIGH
AIX must be able to control the ability of remote login for users.Remote access services, such as those providing remote access to network devices and information systems, which lack automated control capabilities, i...
V-215257
LOWMEDIUMHIGH
The AIX rexec daemon must not be running.The exec service is used to execute a command sent from a remote server. The username and passwords are passed over the network in clear text and ther...
V-215258
LOWMEDIUMHIGH
AIX telnet daemon must not be running.This telnet service is used to service remote user connections. This is historically the most commonly used remote access method for UNIX servers. The...
V-215259
LOWMEDIUMHIGH
AIX ftpd daemon must not be running.The ftp service is used to transfer files from or to a remote machine. The username and passwords are passed over the network in clear text and theref...
V-215260
LOWMEDIUMHIGH
AIX must remove NOPASSWD tag from sudo config files.sudo command does not require reauthentication if NOPASSWD tag is specified in /etc/sudoers config file, or sudoers files in /etc/sudoers.d/ directory...
V-215322
LOWMEDIUMHIGH
AIX must disable /usr/bin/rcp, /usr/bin/rlogin, /usr/bin/rsh, /usr/bin/rexec and /usr/bin/telnet commands.The listed applications permit the transmission of passwords in plain text. Alternative applications such as SSH, which encrypt data, should be use i...
V-215334
LOWMEDIUMHIGH
AIX must disable trivial file transfer protocol.Without auditing the enforcement of access restrictions against changes to the application configuration, it will be difficult to identify attempted a...
V-215346
LOWMEDIUMHIGH
The AIX rsh daemon must be disabled.The rsh daemon permits username and passwords to be passed over the network in clear text....
V-215347
LOWMEDIUMHIGH
The AIX rlogind service must be disabled.The rlogin daemon permits username and passwords to be passed over the network in clear text....
V-215375
LOWMEDIUMHIGH
The ntalk daemon must be disabled on AIX.This service establishes a two-way communication link between two users, either locally or remotely. Unless required the ntalk service will be disable...
V-215403
LOWMEDIUMHIGH
The AIX system must have no .netrc files on the system.Unencrypted passwords for remote FTP servers may be stored in .netrc files. Policy requires passwords be encrypted in storage and not used in access s...
V-215169
LOWMEDIUMHIGH
AIX /etc/security/mkuser.sys.custom file must not exist unless it is needed for customizing a new user account.The "/etc/security/mkuser.sys.custom" is called by "/etc/security/mkuser.sys" to customize the new user account when a new user is created, or a user ...
V-215170
LOWMEDIUMHIGH
AIX must automatically remove or disable temporary user accounts after 72 hours or sooner.If temporary user accounts remain active when no longer needed or for an excessive period, these accounts may be used to gain unauthorized access. To ...
V-215171
LOWMEDIUMHIGH
AIX must enforce the limit of three consecutive invalid login attempts by a user before the user account is locked and released by an administrator.By limiting the number of failed login attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-force att...
V-215172
LOWMEDIUMHIGH
AIX must limit the number of concurrent sessions to 10 for all accounts and/or account types.Operating system management includes the ability to control the number of users and user sessions that utilize an operating system. Limiting the numbe...
V-215173
LOWMEDIUMHIGH
If the AIX system is using LDAP for authentication or account information, the LDAP SSL, or TLS connection must require the server provide a certificate and this certificate must have a valid path to a trusted CA.Without path validation, an informed trust decision by the relying party cannot be made when presented with any certificate not already explicitly tru...
V-215178
LOWMEDIUMHIGH
Direct logins to the AIX system must not be permitted to shared accounts, default accounts, application accounts, and utility accounts.Shared accounts (accounts where two or more people log in with the same user identification) do not provide identification and authentication. There i...
V-215180
LOWMEDIUMHIGH
The AIX system must automatically remove or disable emergency accounts after the crisis is resolved or 72 hours.Emergency accounts are privileged accounts that are established in response to crisis situations where the need for rapid account activation is requir...
V-215181
LOWMEDIUMHIGH
The shipped /etc/security/mkuser.sys file on AIX must not be customized directly.The "/etc/security/mkuser.sys" script customizes the new user account when a new user is created, or a user is logging into the system without a home ...
V-215182
LOWMEDIUMHIGH
The regular users default primary group must be staff (or equivalent) on AIX.The /usr/lib/security/mkuser.default file contains the default primary groups for regular and admin users. Setting a system group as the regular users...
V-215183
LOWMEDIUMHIGH
All system files, programs, and directories must be owned by a system account.Restricting permissions will protect the files from unauthorized modification....
V-215184
LOWMEDIUMHIGH
AIX device files and directories must only be writable by users with a system account or as configured by the vendor.System device files in writable directories could be modified, removed, or used by an unprivileged user to control system hardware....
V-215186
LOWMEDIUMHIGH
AIX must configure the ttys value for all interactive users.A user's "ttys" attribute controls from which device(s) the user can authenticate and log in. If the "ttys" attribute is not specified, all terminals ...
V-215187
LOWMEDIUMHIGH
AIX must provide the lock command to let users retain their session lock until users are reauthenticated.All systems are vulnerable if terminals are left logged in and unattended. Leaving system terminals unsecure poses a potential security hazard. To l...
V-215188
LOWMEDIUMHIGH
AIX must provide xlock command in the CDE environment to let users retain their sessions lock until users are reauthenticated.All systems are vulnerable if terminals are left logged in and unattended. Leaving system terminals unsecure poses a potential security hazard. If th...
V-215189
LOWMEDIUMHIGH
AIX system must prevent the root account from directly logging in except from the system console.Limiting the root account direct logins to only system consoles protects the root account from direct unauthorized access from a non-console device. ...
V-215190
LOWMEDIUMHIGH
All AIX public directories must be owned by root or an application account.If a public directory has the sticky bit set and is not owned by a privileged UID, unauthorized users may be able to modify files created by others. T...
V-215191
LOWMEDIUMHIGH
AIX administrative accounts must not run a web browser, except as needed for local service administration.If a web browser flaw is exploited while running as a privileged user, the entire system could be compromised. Specific exceptions for local service...
V-215192
LOWMEDIUMHIGH
AIX default system accounts (with the exception of root) must not be listed in the cron.allow file or must be included in the cron.deny file, if cron.allow does not exist.To centralize the management of privileged account crontabs, of the default system accounts, only root may have a crontab....
V-215193
LOWMEDIUMHIGH
The AIX root account must not have world-writable directories in its executable search path.If the root search path contains a world-writable directory, malicious software could be placed in the path by intruders and/or malicious users and in...
V-215194
LOWMEDIUMHIGH
The Group Identifiers (GIDs) reserved for AIX system accounts must not be assigned to non-system accounts as their primary group GID.Reserved GIDs are typically used by system software packages. If non-system groups have GIDs in this range, they may conflict with system software, po...
V-215195
LOWMEDIUMHIGH
UIDs reserved for system accounts must not be assigned to non-system accounts on AIX systems.Reserved UIDs are typically used by system software packages. If non-system accounts have UIDs in this range, they may conflict with system software, ...
V-215196
LOWMEDIUMHIGH
The AIX root accounts list of preloaded libraries must be empty.The library preload list environment variable contains a list of libraries for the dynamic linker to load before loading the libraries required by the...
V-215198
LOWMEDIUMHIGH
The AIX root accounts home directory (other than /) must have mode 0700.Users' home directories/folders may contain information of a sensitive nature. Non-privileged users should coordinate any sharing of information with ...
V-215199
LOWMEDIUMHIGH
The AIX root accounts home directory must not have an extended ACL.Excessive permissions on root home directories allow unauthorized access to root user files....
V-215200
LOWMEDIUMHIGH
AIX must display the Standard Mandatory DoD Notice and Consent Banner before granting local or remote login access to the system.Display of a standardized and approved use notification before granting access to the operating system ensures privacy and security notification verbi...
V-215201
LOWMEDIUMHIGH
The Department of Defense (DoD) login banner must be displayed immediately prior to, or as part of, graphical desktop environment login prompts on AIX.Display of a standardized and approved use notification before granting access to the operating system ensures privacy and security notification verbi...
V-215202
LOWMEDIUMHIGH
The Department of Defense (DoD) login banner must be displayed during SSH, sftp, and scp login sessions on AIX.Display of a standardized and approved use notification before granting access to the operating system ensures privacy and security notification verbi...
V-215203
LOWMEDIUMHIGH
Any publically accessible connection to AIX operating system must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the system.Display of a standardized and approved use notification before granting access to the publicly accessible operating system ensures privacy and securit...
V-215205
LOWMEDIUMHIGH
If LDAP authentication is required, AIX must setup LDAP client to refresh user and group caches less than a day.If cached authentication information is out-of-date, the validity of the authentication information may be questionable....
V-215206
LOWMEDIUMHIGH
The AIX /etc/passwd, /etc/security/passwd, and/or /etc/group files must not contain a plus (+) without defining entries for NIS+ netgroups or LDAP netgroups.A plus (+) in system accounts files causes the system to lookup the specified entry using NIS. If the system is not using NIS, no such entries should ...
V-215207
LOWMEDIUMHIGH
AIX must protect the confidentiality and integrity of all information at rest.Information at rest refers to the state of information when it is located on a secondary storage device (e.g., disk drive and tape drive, when used fo...
V-215208
LOWMEDIUMHIGH
AIX must provide time synchronization applications that can synchronize the system clock to external time sources at least every 24 hours.Inaccurate time stamps make it more difficult to correlate events and can lead to an inaccurate analysis. Determining the correct time a particular ev...
V-215209
LOWMEDIUMHIGH
All AIX NFS anonymous UIDs and GIDs must be configured to values without permissions.When an NFS server is configured to deny remote root access, a selected UID and GID are used to handle requests from the remote root user. The UID and...
V-215210
LOWMEDIUMHIGH
AIX nosuid option must be enabled on all NFS client mounts.Enabling the nosuid mount option prevents the system from granting owner or group-owner privileges to programs with the suid or sgid bit set. If the s...
V-215211
LOWMEDIUMHIGH
AIX must be configured to allow users to directly initiate a session lock for all connection types.A session lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the information system but do...
V-215212
LOWMEDIUMHIGH
AIX CDE must conceal, via the session lock, information previously visible on the display with a publicly viewable image.A session lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the information system but do...
V-215214
LOWMEDIUMHIGH
If LDAP authentication is required on AIX, SSL must be used between LDAP clients and the LDAP servers to protect the integrity of remote access sessions.If LDAP authentication is used, SSL must be used between LDAP clients and the LDAP servers to protect the integrity of remote access sessions....
V-215215
LOWMEDIUMHIGH
AIX must only allow the use of DoD PKI-established certificate authorities for verification of the establishment of protected sessions.Untrusted Certificate Authorities (CA) can issue certificates, but they may be issued by organizations or individuals that seek to compromise DoD syst...
V-215216
LOWMEDIUMHIGH
AIX must implement NIST FIPS-validated cryptography for the following: to provision digital signatures, to generate cryptographic hashes, and to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.FIPS 140-2 is the current standard for validating that mechanisms used to access cryptographic modules utilize authentication that meets DoD requireme...
V-215222
LOWMEDIUMHIGH
AIX Operating systems must enforce 24 hours/1 day as the minimum password lifetime.Enforcing a minimum password lifetime helps to prevent repeated password changes to defeat the password reuse or history enforcement requirement. If u...
V-215223
LOWMEDIUMHIGH
AIX Operating systems must enforce a 60-day maximum password lifetime restriction.Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed periodically. If the operating system does not...
V-215227
LOWMEDIUMHIGH
AIX must enforce password complexity by requiring that at least one special character be used.Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity or strength is a measure o...
V-215229
LOWMEDIUMHIGH
AIX must prevent the use of dictionary words for passwords.If the operating system allows the user to select passwords based on dictionary words, then this increases the chances of password compromise by incre...
V-215230
LOWMEDIUMHIGH
The password hashes stored on AIX system must have been generated using a FIPS 140-2 approved cryptographic hashing algorithm.Systems must employ cryptographic hashes for passwords using the SHA-2 family of algorithms or FIPS 140-2 approved successors. The use of unapproved a...
V-215231
LOWMEDIUMHIGH
If SNMP service is enabled on AIX, the default SNMP password must not be used in the /etc/snmpd.conf config file.Use default SNMP password increases the chance of security vulnerability on SNMP service....
V-215232
LOWMEDIUMHIGH
AIX must require passwords to contain no more than three consecutive repeating characters.Passwords with excessive repeating characters may be more vulnerable to password-guessing attacks....
V-215234
LOWMEDIUMHIGH
NFS file systems on AIX must be mounted with the nosuid option unless the NFS file systems contain approved setuid or setgid programs.The nosuid mount option causes the system to not execute setuid files with owner privileges. This option must be used for mounting any file system not...
V-215235
LOWMEDIUMHIGH
AIX removable media, remote file systems, and any file system not containing approved device files must be mounted with the nodev option.The nodev (or equivalent) mount option causes the system to not handle device files as system devices. This option must be used for mounting any file ...
V-215236
LOWMEDIUMHIGH
AIX must produce audit records containing information to establish what the date, time, and type of events that occurred.Without establishing what type of events occurred, it would be difficult to establish, correlate, and investigate the events leading up to an outage o...
V-215237
LOWMEDIUMHIGH
AIX must produce audit records containing information to establish where the events occurred.Without establishing where events occurred, it is impossible to establish, correlate, and investigate the events leading up to an outage or attack. I...
V-215238
LOWMEDIUMHIGH
AIX must produce audit records containing information to establish the source and the identity of any individual or process associated with an event.Without establishing the source of the event, it is impossible to establish, correlate, and investigate the events leading up to an outage or attack. ...
V-215239
LOWMEDIUMHIGH
AIX must produce audit records containing information to establish the outcome of the events.Without information about the outcome of events, security personnel cannot make an accurate assessment as to whether an attack was successful or if ch...
V-215240
LOWMEDIUMHIGH
AIX must produce audit records containing the full-text recording of privileged commands.Reconstruction of harmful events or forensic analysis is not possible if audit records do not contain enough information. At a minimum, the organizat...
V-215241
LOWMEDIUMHIGH
AIX must be configured to generate an audit record when 75% of the audit file system is full.It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required. Without this notificatio...
V-215242
LOWMEDIUMHIGH
AIX must provide the function to filter audit records for events of interest based upon all audit fields within audit records, support on-demand reporting requirements, and an audit reduction function that supports on-demand audit review and analysis and after-the-fact investigations of security incidents.The ability to specify the event criteria that are of interest provides the individuals reviewing the logs with the ability to quickly isolate and ide...
V-215243
LOWMEDIUMHIGH
Audit logs on the AIX system must be owned by root.Unauthorized disclosure of audit records can reveal system and configuration data to attackers, thus compromising its confidentiality. Audit informat...
V-215244
LOWMEDIUMHIGH
Audit logs on the AIX system must be group-owned by system.Unauthorized disclosure of audit records can reveal system and configuration data to attackers, thus compromising its confidentiality. Audit informat...
V-215245
LOWMEDIUMHIGH
Audit logs on the AIX system must be set to 660 or less permissive.Unauthorized disclosure of audit records can reveal system and configuration data to attackers, thus compromising its confidentiality. Audit informat...
V-215246
LOWMEDIUMHIGH
AIX must provide audit record generation functionality for DoD-defined auditable events.Without the capability to generate audit records, it would be difficult to establish, correlate, and investigate the events relating to an incident or...
V-215247
LOWMEDIUMHIGH
AIX must start audit at boot.If auditing is enabled late in the start-up process, the actions of some start-up processes may not be audited. Some audit systems also maintain state...
V-215248
LOWMEDIUMHIGH
AIX audit tools must be owned by root.Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tool...
V-215249
LOWMEDIUMHIGH
AIX audit tools must be group-owned by audit.Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tool...
V-215250
LOWMEDIUMHIGH
AIX audit tools must be set to 4550 or less permissive.Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tool...
V-215251
LOWMEDIUMHIGH
AIX must verify the hash of audit tools.Protecting the integrity of the tools used for auditing purposes is a critical step toward ensuring the integrity of audit information. Audit informat...
V-215252
LOWMEDIUMHIGH
AIX must provide the function for assigned ISSOs or designated SAs to change the auditing to be performed on all operating system components, based on all selectable event criteria in near real time.If authorized individuals do not have the ability to modify auditing parameters in response to a changing threat environment, the organization may not...
V-215253
LOWMEDIUMHIGH
AIX must allocate audit record storage capacity to store at least one weeks worth of audit records, when audit records are not immediately sent to a central audit record storage facility.In order to ensure operating systems have a sufficient storage capacity in which to write the audit logs, operating systems need to be able to allocat...
V-215254
LOWMEDIUMHIGH
AIX must provide a report generation function that supports on-demand audit review and analysis, on-demand reporting requirements, and after-the-fact investigations of security incidents.The report generation capability must support on-demand review and analysis in order to facilitate the organization's ability to generate incident rep...
V-215255
LOWMEDIUMHIGH
AIX must record time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT).If time stamps are not consistently applied and there is no common time reference, it is difficult to perform forensic analysis. Time stamps generate...
V-215256
LOWMEDIUMHIGH
AIX audit logs must be rotated daily.Rotate audit logs daily to preserve audit file system space and to conform to the DoD/DISA requirement. If it is not rotated daily and moved to anothe...
V-215261
LOWMEDIUMHIGH
AIX must remove !authenticate option from sudo config files.sudo command does not require reauthentication if !authenticate option is specified in /etc/sudoers config file, or config files in /etc/sudoers.d/ di...
V-215262
LOWMEDIUMHIGH
AIX must be configured with a default gateway for IPv4 if the system uses IPv4, unless the system is a router.If a system has no default gateway defined, the system is at increased risk of man-in-the-middle, monitoring, and Denial of Service attacks....
V-215263
LOWMEDIUMHIGH
IP forwarding for IPv4 must not be enabled on AIX unless the system is a router.IP forwarding permits the kernel to forward packets from one network interface to another. The ability to forward packets between two networks is only...
V-215264
LOWMEDIUMHIGH
AIX must be configured with a default gateway for IPv6 if the system uses IPv6 unless the system is a router.If a system has no default gateway defined, the system is at increased risk of man-in-the-middle, monitoring, and Denial of Service attacks....
V-215265
LOWMEDIUMHIGH
AIX must not have IP forwarding for IPv6 enabled unless the system is an IPv6 router.If the system is configured for IP forwarding and is not a designated router, it could be used to bypass network security by providing a path for comm...
V-215266
LOWMEDIUMHIGH
AIX log files must be owned by a system account.Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational st...
V-215267
LOWMEDIUMHIGH
AIX log files must be owned by a system group.Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational st...
V-215268
LOWMEDIUMHIGH
AIX system files, programs, and directories must be group-owned by a system group.Restricting permissions will protect the files from unauthorized modification....
V-215269
LOWMEDIUMHIGH
The inetd.conf file on AIX must be owned by root.Failure to give ownership of sensitive files or utilities to system groups may provide unauthorized users with the potential to access sensitive infor...
V-215270
LOWMEDIUMHIGH
AIX cron and crontab directories must be owned by root or bin.Incorrect ownership of the cron or crontab directories could permit unauthorized users the ability to alter cron jobs and run automated jobs as privil...
V-215271
LOWMEDIUMHIGH
AIX audio devices must be group-owned by root, sys, bin, or system.Without privileged group owners, audio devices will be vulnerable to being used as eaves-dropping devices by malicious users or intruders to possibly ...
V-215272
LOWMEDIUMHIGH
AIX time synchronization configuration file must be owned by root.A synchronized system clock is critical for the enforcement of time-based policies and the correlation of logs and audit records with other systems. I...
V-215273
LOWMEDIUMHIGH
AIX time synchronization configuration file must be group-owned by bin, or system.A synchronized system clock is critical for the enforcement of time-based policies and the correlation of logs and audit records with other systems. I...
V-215274
LOWMEDIUMHIGH
The AIX /etc/group file must be owned by root.The "/etc/group" file contains information regarding groups that are configured on the system. Protection of this file is important for system securit...
V-215275
LOWMEDIUMHIGH
The AIX /etc/group file must be group-owned by security.The "/etc/group" file contains information regarding groups that are configured on the system. Protection of this file is important for system securit...
V-215276
LOWMEDIUMHIGH
All AIX interactive users home directories must be owned by their respective users.System binaries are executed by privileged users as well as system services, and restrictive permissions are necessary to ensure that their execution ...
V-215277
LOWMEDIUMHIGH
All AIX interactive users home directories must be group-owned by the home directory owner primary group.If the Group Identifier (GID) of the home directory is not the same as the GID of the user, this would allow unauthorized access to files....
V-215278
LOWMEDIUMHIGH
All files and directories contained in users home directories on AIX must be group-owned by a group in which the home directory owner is a member.If the Group Identifier (GID) of the home directory is not the same as the GID of the user, this would allow unauthorized access to files....
V-215279
LOWMEDIUMHIGH
AIX library files must have mode 0755 or less permissive.Unauthorized access could destroy the integrity of the library files....
V-215280
LOWMEDIUMHIGH
Samba packages must be removed from AIX.If the smbpasswd file has a mode more permissive than 0600, the smbpasswd file may be maliciously accessed or modified, potentially resulting in the c...
V-215281
LOWMEDIUMHIGH
AIX time synchronization configuration file must have mode 0640 or less permissive.A synchronized system clock is critical for the enforcement of time-based policies and the correlation of logs and audit records with other systems. I...
V-215282
LOWMEDIUMHIGH
The AIX /etc/group file must have mode 0644 or less permissive.The "/etc/group" file contains information regarding groups that are configured on the system. Protection of this file is important for system securit...
V-215283
LOWMEDIUMHIGH
AIX must encrypt user data at rest using AIX Encrypted File System (EFS) if it is required.The AIX Encrypted File System (EFS) is a J2 filesystem-level encryption through individual key stores. This allows for file encryption in order to pro...
V-215284
LOWMEDIUMHIGH
AIX must protect the confidentiality and integrity of transmitted information during preparation for transmission and maintain the confidentiality and integrity of information during reception and disable all non-encryption network access methods.Without protection of the transmitted or received information, confidentiality and integrity may be compromised because unprotected communications can...
V-215285
LOWMEDIUMHIGH
AIX must monitor and record successful remote logins.Remote access services, such as those providing remote access to network devices and information systems, which lack automated monitoring capabilities...
V-215286
LOWMEDIUMHIGH
AIX must monitor and record unsuccessful remote logins.Remote access services, such as those providing remote access to network devices and information systems, which lack automated monitoring capabilities...
V-215287
LOWMEDIUMHIGH
On AIX, the SSH server must not permit root logins using remote access programs.Permitting direct root login reduces auditable information about who ran privileged commands on the system and also allows direct attack attempts on r...
V-215288
LOWMEDIUMHIGH
All AIX shells referenced in passwd file must be listed in /etc/shells file, except any shells specified for the purpose of preventing logins.The /etc/shells file lists approved default shells. It helps provide layered defense to the security approach by ensuring users cannot change their de...
V-215289
LOWMEDIUMHIGH
The AIX SSH server must use SSH Protocol 2.Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote access session. Remote ...
V-215290
LOWMEDIUMHIGH
AIX must config the SSH idle timeout interval.Automatic session termination addresses the termination of user-initiated logical sessions in contrast to the termination of network connections that ...
V-215291
LOWMEDIUMHIGH
AIX must disable Kerberos Authentication in ssh config file to enforce access restrictions.Without auditing the enforcement of access restrictions against changes to the application configuration, it will be difficult to identify attempted a...
V-215292
LOWMEDIUMHIGH
If GSSAPI authentication is not required on AIX, the SSH daemon must disable GSSAPI authentication.GSSAPI authentication is used to provide additional authentication mechanisms to applications. Allowing GSSAPI authentication through SSH exposes the ...
V-215293
LOWMEDIUMHIGH
AIX must setup SSH daemon to disable revoked public keys.Without configuring a local cache of revocation data, there is the potential to allow access to users who are no longer authorized (users with revoked...
V-215294
LOWMEDIUMHIGH
AIX SSH daemon must be configured to only use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hash algorithms.DoD information systems are required to use FIPS 140-2 approved cryptographic hash functions....
V-215295
LOWMEDIUMHIGH
The AIX SSH daemon must be configured for IP filtering.The SSH daemon must be configured for IP filtering to provide a layered defense against connection attempts from unauthorized addresses....
V-215296
LOWMEDIUMHIGH
The AIX SSH daemon must not allow compression.If compression is allowed in an SSH connection prior to authentication, vulnerabilities in the compression software could result in compromise of the ...
V-215297
LOWMEDIUMHIGH
AIX must turn on SSH daemon privilege separation.SSH daemon privilege separation causes the SSH process to drop root privileges when not needed, which would decrease the impact of software vulnerabil...
V-215298
LOWMEDIUMHIGH
AIX must turn on SSH daemon reverse name checking.If reverse name checking is off, SSH may allow a remote attacker to circumvent security policies and attempt to or actually login from IP addresses th...
V-215299
LOWMEDIUMHIGH
AIX SSH daemon must perform strict mode checking of home directory configuration files.If other users have access to modify user-specific SSH configuration files, they may be able to log into the system as another user....
V-215300
LOWMEDIUMHIGH
AIX must turn off X11 forwarding for the SSH daemon.X11 forwarding over SSH allows for the secure remote execution of X11-based applications. This feature can increase the attack surface of an SSH conne...
V-215301
LOWMEDIUMHIGH
AIX must turn off TCP forwarding for the SSH daemon.SSH TCP connection forwarding provides a mechanism to establish TCP connections proxied by the SSH server. This function can provide similar convenien...
V-215302
LOWMEDIUMHIGH
The AIX SSH daemon must be configured to disable empty passwords.When password authentication is allowed, PermitEmptyPasswords specifies whether the server allows login to accounts with empty password strings. If an...
V-215303
LOWMEDIUMHIGH
The AIX SSH daemon must be configured to disable user .rhosts files.Trust .rhost file means a compromise on one host can allow an attacker to move trivially to other hosts....
V-215304
LOWMEDIUMHIGH
The AIX SSH daemon must be configured to not use host-based authentication.SSH trust relationships mean a compromise on one host can allow an attacker to move trivially to other hosts....
V-215305
LOWMEDIUMHIGH
The AIX SSH daemon must not allow RhostsRSAAuthentication.If SSH permits rhosts RSA authentication, a user may be able to log in based on the keys of the host originating the request and not any user-specific...
V-215306
LOWMEDIUMHIGH
If AIX SSH daemon is required, the SSH daemon must only listen on the approved listening IP addresses.The SSH daemon should only listen on the approved listening IP addresses. Otherwise the SSH service could be subject to unauthorized access....
V-215308
LOWMEDIUMHIGH
AIX system must require authentication upon booting into single-user and maintenance modes.This prevents attackers with physical access from trivially bypassing security on the machine and gaining root access. Such accesses are further preve...
V-215312
LOWMEDIUMHIGH
AIX must implement a remote syslog server that is documented using site-defined procedures.If a remote log host is in use and it has not been justified and documented, sensitive information could be obtained by unauthorized users without the...
V-215313
LOWMEDIUMHIGH
The AIX syslog daemon must not accept remote messages unless it is a syslog server documented using site-defined procedures.Unintentionally running a syslog server accepting remote messages puts the system at increased risk. Malicious syslog messages sent to the server coul...
V-215314
LOWMEDIUMHIGH
AIX must be configured to use syslogd to log events by TCPD.Without auditing the enforcement of access restrictions against changes to the application configuration, it will be difficult to identify attempted a...
V-215315
LOWMEDIUMHIGH
The AIX audit configuration files must be owned by root.Without the capability to restrict which roles and individuals can select which events are audited, unauthorized personnel may be able to prevent the ...
V-215316
LOWMEDIUMHIGH
The AIX audit configuration files must be group-owned by audit.Without the capability to restrict which roles and individuals can select which events are audited, unauthorized personnel may be able to prevent the ...
V-215317
LOWMEDIUMHIGH
The AIX audit configuration files must be set to 640 or less permissive.Without the capability to restrict which roles and individuals can select which events are audited, unauthorized personnel may be able to prevent the ...
V-215318
LOWMEDIUMHIGH
AIX must automatically lock after 15 minutes of inactivity in the CDE Graphical desktop environment.A session time-out lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the information syst...
V-215320
LOWMEDIUMHIGH
AIX must set inactivity time-out on login sessions and terminate all login sessions after 10 minutes of inactivity.Automatic session termination addresses the termination of user-initiated logical sessions in contrast to the termination of network connections that ...
V-215321
LOWMEDIUMHIGH
AIX SSH private host key files must have mode 0600 or less permissive.If the private key is discovered, an attacker can use the key to authenticate as an authorized user and gain access to the network infrastructure. Th...
V-215323
LOWMEDIUMHIGH
AIX log files must have mode 0640 or less permissive.Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational st...
V-215324
LOWMEDIUMHIGH
AIX log files must not have extended ACLs, except as needed to support authorized software.Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational st...
V-215325
LOWMEDIUMHIGH
All system command files must not have extended ACLs.Restricting permissions will protect system command files from unauthorized modification. System command files include files present in directories us...
V-215326
LOWMEDIUMHIGH
All library files must not have extended ACLs.Unauthorized access could destroy the integrity of the library files....
V-215327
LOWMEDIUMHIGH
AIX passwd.nntp file must have mode 0600 or less permissive.File permissions more permissive than 0600 for /etc/news/passwd.nntp may allow access to privileged information by system intruders or malicious users...
V-215328
LOWMEDIUMHIGH
The AIX /etc/group file must not have an extended ACL.The "/etc/group" file contains information regarding groups that are configured on the system. Protection of this file is important for system securit...
V-215329
LOWMEDIUMHIGH
The AIX ldd command must be disabled.The ldd command provides a list of dependent libraries needed by a given binary, which is useful for troubleshooting software. Instead of parsing the ...
V-215330
LOWMEDIUMHIGH
AIX NFS server must be configured to restrict file system access to local hosts.The NFS access option limits user access to the specified level. This assists in protecting exported file systems. If access is not restricted, unauth...
V-215331
LOWMEDIUMHIGH
All AIX users home directories must have mode 0750 or less permissive.Excessive permissions on home directories allow unauthorized access to user files....
V-215332
LOWMEDIUMHIGH
The AIX user home directories must not have extended ACLs.Excessive permissions on home directories allow unauthorized access to user files....
V-215333
LOWMEDIUMHIGH
AIX must use Trusted Execution (TE) Check policy.Discretionary Access Control (DAC) is based on the notion that individual users are "owners" of objects and therefore have discretion over who should ...
V-215335
LOWMEDIUMHIGH
AIX must employ a deny-all, permit-by-exception policy to allow the execution of authorized software programs.Control of program execution is a mechanism used to prevent execution of unauthorized programs. Some operating systems may provide a capability that r...
V-215336
LOWMEDIUMHIGH
AIX must remove all software components after updated versions have been installed.Previous versions of software components that are not removed from the information system after updates have been installed may be exploited by advers...
V-215337
LOWMEDIUMHIGH
AIX must enforce a delay of at least 4 seconds between login prompts following a failed login attempt.Limiting the number of login attempts over a certain time interval reduces the chances that an unauthorized user may gain access to an account....
V-215338
LOWMEDIUMHIGH
AIX system must restrict the ability to switch to the root user to members of a defined group.Configuring a supplemental group for users permitted to switch to the root user prevents unauthorized users from accessing the root account, even with...
V-215339
LOWMEDIUMHIGH
All AIX Group Identifiers (GIDs) referenced in the /etc/passwd file must be defined in the /etc/group file.If a user is assigned the GID of a group not existing on the system, and a group with that GID is subsequently created, the user may have unintended r...
V-215340
LOWMEDIUMHIGH
All AIX files and directories must have a valid owner.Unowned files do not directly imply a security problem, but they are generally a sign that something is amiss. They may be caused by an intruder, by i...
V-215341
LOWMEDIUMHIGH
The sticky bit must be set on all public directories on AIX systems.Failing to set the sticky bit on public directories allows unauthorized users to delete files in the directory structure. The only authorized public d...
V-215342
LOWMEDIUMHIGH
The AIX global initialization files must contain the mesg -n or mesg n commands.Command "mesg -n" allows only the root user the permission to send messages to your workstation to avoid having others clutter your display with incom...
V-215343
LOWMEDIUMHIGH
The AIX hosts.lpd file must not contain a + character.Having the '+' character in the hosts.lpd (or equivalent) file allows all hosts to use local system print resources....
V-215344
LOWMEDIUMHIGH
AIX sendmail logging must not be set to less than nine in the sendmail.cf file.If Sendmail is not configured to log at level 9, system logs may not contain the information necessary for tracking unauthorized use of the sendmail s...
V-215345
LOWMEDIUMHIGH
AIX run control scripts executable search paths must contain only absolute paths.The executable search path (typically the PATH environment variable) contains a list of directories for the shell to search to find executables. If th...
V-215348
LOWMEDIUMHIGH
The AIX qdaemon must be disabled if local or remote printing is not required.The qdaemon program is the printing scheduling daemon that manages the submission of print jobs to the piobe service. To prevent remote attacks this ...
V-215349
LOWMEDIUMHIGH
If AIX system does not act as a remote print server for other servers, the lpd daemon must be disabled.The lpd daemon accepts remote print jobs from other systems. To prevent remote attacks this daemon should not be enabled unless there is no alternati...
V-215350
LOWMEDIUMHIGH
If AIX system does not support either local or remote printing, the piobe service must be disabled.The piobe daemon is the I/O back end for the printing process, handling the job scheduling and spooling. To prevent remote attacks this daemon should...
V-215351
LOWMEDIUMHIGH
If there are no X11 clients that require CDE on AIX, the dt service must be disabled.This entry executes the CDE startup script which starts the AIX Common Desktop Environment. To prevent attacks this daemon should not be enabled unle...
V-215352
LOWMEDIUMHIGH
If NFS is not required on AIX, the NFS daemon must be disabled.The rcnfs entry starts the NFS daemons during system boot. NFS is a service with numerous historical vulnerabilities and should not be enabled unless...
V-215353
LOWMEDIUMHIGH
If sendmail is not required on AIX, the sendmail service must be disabled.The sendmail service has many historical vulnerabilities and, where possible, should be disabled. If the system is not required to operate as a mail s...
V-215354
LOWMEDIUMHIGH
If SNMP is not required on AIX, the snmpd service must be disabled.The snmpd daemon is used by many 3rd party applications to monitor the health of the system. This allows remote monitoring of network and server confi...
V-215355
LOWMEDIUMHIGH
The AIX DHCP client must be disabled.The dhcpcd daemon receives address and configuration information from the DHCP server. DHCP relies on trusting the local network. If the local network...
V-215356
LOWMEDIUMHIGH
If DHCP is not enabled in the network on AIX, the dhcprd daemon must be disabled.The dhcprd daemon listens for broadcast packets, receives them, and forwards them to the appropriate server. To prevent remote attacks this daemon sh...
V-215357
LOWMEDIUMHIGH
If IPv6 is not utilized on AIX server, the autoconf6 daemon must be disabled."autoconf6" is used to automatically configure IPv6 interfaces at boot time. Running this service may allow other hosts on the same physical subnet to...
V-215358
LOWMEDIUMHIGH
If AIX server is not functioning as a network router, the gated daemon must be disabled.This daemon provides gateway routing functions for protocols such as RIP and SNMP. To prevent remote attacks this daemon should not be enabled unless...
V-215359
LOWMEDIUMHIGH
If AIX server is not functioning as a multicast router, the mrouted daemon must be disabled.This daemon is an implementation of the multicast routing protocol. To prevent remote attacks this daemon should not be enabled unless there is no al...
V-215360
LOWMEDIUMHIGH
If AIX server is not functioning as a DNS server, the named daemon must be disabled.This is the server for the DNS protocol and controls domain name resolution for its clients. To prevent attacks this daemon should not be enabled unl...
V-215361
LOWMEDIUMHIGH
If AIX server is not functioning as a network router, the routed daemon must be disabled.The routed daemon manages the network routing tables in the kernel. To prevent attacks this daemon should not be enabled unless there is no alternati...
V-215362
LOWMEDIUMHIGH
If rwhod is not required on AIX, the rwhod daemon must be disabled.This is the remote WHO service. To prevent remote attacks this daemon should not be enabled unless there is no alternative....
V-215363
LOWMEDIUMHIGH
The timed daemon must be disabled on AIX.This is the old UNIX time service. The timed daemon is the old UNIX time service. Disable this service and use xntp, if time synchronization is requi...
V-215364
LOWMEDIUMHIGH
If AIX server does not host an SNMP agent, the dpid2 daemon must be disabled.The dpid2 daemon acts as a protocol converter, which enables DPI (SNMP v2) sub-agents, such as hostmibd, to talk to a SNMP v1 agent that follows SNMP ...
V-215365
LOWMEDIUMHIGH
If SNMP is not required on AIX, the snmpmibd daemon must be disabled.The snmpmibd daemon is a dpi2 sub-agent which manages a number of MIB variables. If snmpd is not required, it is recommended that it is disabled....
V-215366
LOWMEDIUMHIGH
The aixmibd daemon must be disabled on AIX.The aixmibd daemon is a dpi2 sub-agent which manages a number of MIB variables. To prevent attacks this daemon should not be enabled unless there is...
V-215367
LOWMEDIUMHIGH
The ndpd-host daemon must be disabled on AIX.This is the Neighbor Discovery Protocol (NDP) daemon, required in IPv6. The ndpd-host is the NDP daemon for the server. Unless the server utilizes IP...
V-215368
LOWMEDIUMHIGH
The ndpd-router must be disabled on AIX.This manages the Neighbor Discovery Protocol (NDP) for non-kernel activities, required in IPv6. The ndpd-router manages NDP for non-kernel activities...
V-215369
LOWMEDIUMHIGH
The daytime daemon must be disabled on AIX.The daytime service provides the current date and time to other servers on a network. This daytime service is a defunct time service, typically used ...
V-215370
LOWMEDIUMHIGH
The cmsd daemon must be disabled on AIX.This is a calendar and appointment service for CDE. The cmsd service is utilized by CDE to provide calendar functionality. If CDE is not required, th...
V-215371
LOWMEDIUMHIGH
The ttdbserver daemon must be disabled on AIX.The ttdbserver service is the tool-talk database service for CDE. This service runs as root and should be disabled. Unless required the ttdbserver ser...
V-215372
LOWMEDIUMHIGH
The uucp (UNIX to UNIX Copy Program) daemon must be disabled on AIX.This service facilitates file copying between networked servers. The uucp (UNIX to UNIX Copy Program), service allows users to copy files between net...
V-215373
LOWMEDIUMHIGH
The time daemon must be disabled on AIX.This service can be used to synchronize system clocks. The time service is an obsolete process used to synchronize system clocks at boot time. This h...
V-215374
LOWMEDIUMHIGH
The talk daemon must be disabled on AIX.This talk service is used to establish an interactive two-way communication link between two UNIX users. Unless required the talk service will be disa...
V-215376
LOWMEDIUMHIGH
The chargen daemon must be disabled on AIX.This service is used to test the integrity of TCP/IP packets arriving at the destination. This chargen service is a character generator service and i...
V-215377
LOWMEDIUMHIGH
The discard daemon must be disabled on AIX.The discard service is used as a debugging and measurement tool. It sets up a listening socket and ignores data that it receives. This is a /dev/null ...
V-215378
LOWMEDIUMHIGH
The dtspc daemon must be disabled on AIX.The dtspc service deals with the CDE interface of the X11 daemon. It is started automatically by the inetd daemon in response to a CDE client requesti...
V-215379
LOWMEDIUMHIGH
The pcnfsd daemon must be disabled on AIX.The pcnfsd service is an authentication and printing program, which uses NFS to provide file transfer services. This service is vulnerable and exploit...
V-215380
LOWMEDIUMHIGH
The rstatd daemon must be disabled on AIX.The rstatd service is used to provide kernel statistics and other monitorable parameters pertinent to the system such as: CPU usage, system uptime, ne...
V-215381
LOWMEDIUMHIGH
The rusersd daemon must be disabled on AIX.The rusersd service runs as root and provides a list of current users active on a system. An attacker may use this service to learn valid account name...
V-215382
LOWMEDIUMHIGH
The sprayd daemon must be disabled on AIX.The sprayd service is used as a tool to generate UDP packets for testing and diagnosing network problems. The service must be disabled if NFS is not i...
V-215383
LOWMEDIUMHIGH
The klogin daemon must be disabled on AIX.The klogin service offers a higher degree of security than traditional rlogin or telnet by eliminating most clear-text password exchanges on the netwo...
V-215384
LOWMEDIUMHIGH
The kshell daemon must be disabled on AIX.The kshell service offers a higher degree of security than traditional rsh services. However, it still does not use encrypted communications. The reco...
V-215385
LOWMEDIUMHIGH
The rquotad daemon must be disabled on AIX.The rquotad service allows NFS clients to enforce disk quotas on file systems that are mounted on the local system. This service should be disabled if...
V-215386
LOWMEDIUMHIGH
The tftp daemon must be disabled on AIX.The tftp service allows remote systems to download or upload files to the tftp server without any authentication. It is therefore a service that shoul...
V-215387
LOWMEDIUMHIGH
The imap2 service must be disabled on AIX.The imap2 service or Internet Message Access Protocol (IMAP) supports the IMAP4 remote mail access protocol. It works with sendmail and bellmail. This...
V-215388
LOWMEDIUMHIGH
The pop3 daemon must be disabled on AIX.The pop3 service provides a pop3 server. It supports the pop3 remote mail access protocol. It works with sendmail and bellmail. This service should be...
V-215389
LOWMEDIUMHIGH
The finger daemon must be disabled on AIX.The fingerd daemon provides the server function for the finger command. This allows users to view real-time pertinent user login information on other ...
V-215390
LOWMEDIUMHIGH
The instsrv daemon must be disabled on AIX.The instsrv service is part of the Network Installation Tools, used for servicing servers running AIX 3.2. This service should be disabled to prevent ...
V-215391
LOWMEDIUMHIGH
The echo daemon must be disabled on AIX.The echo service can be used in Denial of Service or SMURF attacks. It can also be used by someone else to get through a firewall or start a data stor...
V-215392
LOWMEDIUMHIGH
The Internet Network News (INN) server must be disabled on AIX.Internet Network News (INN) servers access Usenet newsfeeds and store newsgroup articles. INN servers use the Network News Transfer Protocol (NNTP) to...
V-215393
LOWMEDIUMHIGH
If Stream Control Transmission Protocol (SCTP) must be disabled on AIX.The Stream Control Transmission Protocol (SCTP) is an IETF-standardized transport layer protocol. This protocol is not yet widely used. Binding this p...
V-215394
LOWMEDIUMHIGH
The Reliable Datagram Sockets (RDS) protocol must be disabled on AIX.The Reliable Datagram Sockets (RDS) protocol is a relatively new protocol developed by Oracle for communication between the nodes of a cluster. Bindin...
V-215395
LOWMEDIUMHIGH
If automated file system mounting tool is not required on AIX, it must be disabled.Automated file system mounting tools may provide unprivileged users with the ability to access local media and network shares. If this access is not n...
V-215396
LOWMEDIUMHIGH
AIX process core dumps must be disabled.A core dump includes a memory image taken at the time the operating system terminates an application. The memory image could contain sensitive data an...
V-215397
LOWMEDIUMHIGH
AIX kernel core dumps must be disabled unless needed.Kernel core dumps may contain the full contents of system memory at the time of the crash. Kernel core dumps may consume a considerable amount of disk...
V-215398
LOWMEDIUMHIGH
AIX must set Stack Execution Disable (SED) system wide mode to all.DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot accomplish its mission or m...
V-215399
LOWMEDIUMHIGH
AIX must protect against or limit the effects of Denial of Service (DoS) attacks by ensuring AIX is implementing rate-limiting measures on impacted network interfaces.DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot accomplish its mission or m...
V-215400
LOWMEDIUMHIGH
AIX must allow admins to send a message to all the users who logged in currently.Discretionary Access Control (DAC) is based on the notion that individual users are "owners" of objects and therefore have discretion over who should ...
V-215401
LOWMEDIUMHIGH
AIX must allow admins to send a message to a user who logged in currently.Discretionary Access Control (DAC) is based on the notion that individual users are "owners" of objects and therefore have discretion over who should ...
V-215402
LOWMEDIUMHIGH
The AIX SSH daemon must be configured to only use FIPS 140-2 approved ciphers.Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote access session. Remote ...
V-215404
LOWMEDIUMHIGH
AIX must turn on enhanced Role-Based Access Control (RBAC) to isolate security functions from nonsecurity functions, to grant system privileges to other operating system admins, and prohibit user installation of system software without explicit privileged status.To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-approved PKIs, all DoD syst...
V-215405
LOWMEDIUMHIGH
If DHCP server is not required on AIX, the DHCP server must be disabled.The dhcpsd daemon is the DHCP server that serves addresses and configuration information to DHCP clients in the network. To prevent remote attacks th...
V-215406
LOWMEDIUMHIGH
The rwalld daemon must be disabled on AIX.The rwalld service allows remote users to broadcast system wide messages. The service runs as root and should be disabled unless absolutely necessary ...
V-215407
LOWMEDIUMHIGH
In the event of a system failure, AIX must preserve any information necessary to determine cause of failure and any information necessary to return to operations with least disruption to mission processes.Failure to a known state can address safety or security in accordance with the mission/business needs of the organization. Failure to a known secure s...
V-215408
LOWMEDIUMHIGH
The /etc/shells file must exist on AIX systems.The shells file (or equivalent) lists approved default shells. It helps provide layered defense to the security approach by ensuring users cannot chan...
V-215409
LOWMEDIUMHIGH
AIX public directories must be the only world-writable directories and world-writable files must be located only in public directories.World-writable files and directories make it easy for a malicious user to place potentially compromising files on the system. The only authorized publ...
V-215410
LOWMEDIUMHIGH
AIX must be configured to only boot from the system boot device.The ability to boot from removable media is the same as being able to boot into single user or maintenance mode without a password. This ability could...
V-215411
LOWMEDIUMHIGH
AIX must not use removable media as the boot loader.Malicious users with removable boot media can gain access to a system configured to use removable media as the boot loader....
V-215414
LOWMEDIUMHIGH
The sendmail server must have the debug feature disabled on AIX systems.Debug mode is a feature present in older versions of Sendmail which, if not disabled, may allow an attacker to gain access to a system through the Sen...
V-215415
LOWMEDIUMHIGH
SMTP service must not have the EXPN or VRFY features active on AIX systems.The SMTP EXPN function allows an attacker to determine if an account exists on a system, providing significant assistance to a brute force attack on u...
V-215416
LOWMEDIUMHIGH
All global initialization file executable search paths must contain only absolute paths.Failure to restrict system access to authenticated users negatively impacts operating system security....
V-215417
LOWMEDIUMHIGH
The SMTP service HELP command must not be enabled on AIX.The HELP command should be disabled to mask version information. The version of the SMTP service software could be used by attackers to target vulnera...
V-215418
LOWMEDIUMHIGH
NIS maps must be protected through hard-to-guess domain names on AIX.The use of hard-to-guess NIS domain names provides additional protection from unauthorized access to the NIS directory information....
V-215419
LOWMEDIUMHIGH
The AIX systems access control program must be configured to grant or deny system access to specific hosts.If the system's access control program is not configured with appropriate rules for allowing and denying access to system network resources, services ...
V-215420
LOWMEDIUMHIGH
All AIX files and directories must have a valid group owner.Failure to restrict system access to authenticated users negatively impacts operating system security....
V-215421
LOWMEDIUMHIGH
AIX control scripts library search paths must contain only absolute paths.The library search path environment variable(s) contain a list of directories for the dynamic linker to search to find libraries. If this path include...
V-215422
LOWMEDIUMHIGH
The control script lists of preloaded libraries must contain only absolute paths on AIX systems.The library preload list environment variable contains a list of libraries for the dynamic linker to load before loading the libraries required by the...
V-215423
LOWMEDIUMHIGH
The global initialization file lists of preloaded libraries must contain only absolute paths on AIX.The library preload list environment variable contains a list of libraries for the dynamic linker to load before loading the libraries required by the...
V-215424
LOWMEDIUMHIGH
The local initialization file library search paths must contain only absolute paths on AIX.The library search path environment variable(s) contain a list of directories for the dynamic linker to search to find libraries. If this path include...
V-215425
LOWMEDIUMHIGH
The local initialization file lists of preloaded libraries must contain only absolute paths on AIX.The library preload list environment variable contains a list of libraries for the dynamic linker to load before loading the libraries required by the...
V-215426
LOWMEDIUMHIGH
AIX package management tool must be used daily to verify system software.Verification using the system package management tool can be used to determine that system software has not been tampered with. This requirement is no...
V-215427
LOWMEDIUMHIGH
The AIX DHCP client must not send dynamic DNS updates.Dynamic DNS updates transmit unencrypted information about a system including its name and address and should not be used unless needed....
V-215428
LOWMEDIUMHIGH
AIX must not run any routing protocol daemons unless the system is a router.Routing protocol daemons are typically used on routers to exchange network topology information with other routers. If this software is used when not ...
V-215429
LOWMEDIUMHIGH
AIX must not process ICMP timestamp requests.The processing of Internet Control Message Protocol (ICMP) timestamp requests increases the attack surface of the system....
V-215430
LOWMEDIUMHIGH
AIX must not respond to ICMPv6 echo requests sent to a broadcast address.Responding to broadcast ICMP echo requests facilitates network mapping and provides a vector for amplification attacks....
V-215431
LOWMEDIUMHIGH
AIX must define default permissions for all authenticated users in such a way that the user can only read and modify their own files.Setting the most restrictive default permissions ensures that when new accounts are created they do not have unnecessary access....
V-215432
LOWMEDIUMHIGH
There must be no .rhosts, .shosts, hosts.equiv, or shosts.equiv files on the AIX system.Trust files are convenient, but when used in conjunction with the remote login services, they can allow unauthenticated access to a system....
V-215433
LOWMEDIUMHIGH
The .rhosts file must not be supported in AIX PAM..rhosts files are used to specify a list of hosts permitted remote access to a particular account without authenticating. The use of such a mechanism ...
V-215434
LOWMEDIUMHIGH
The AIX root user home directory must not be the root directory (/).Changing the root home directory to something other than / and assigning it a 0700 protection makes it more difficult for intruders to manipulate the ...
V-215435
LOWMEDIUMHIGH
All AIX interactive users must be assigned a home directory in the passwd file and the directory must exist.All users must be assigned a home directory in the passwd file. Failure to have a home directory may result in the user being put in the root director...
V-215436
LOWMEDIUMHIGH
The AIX operating system must use Multi Factor Authentication.To assure accountability and prevent unauthenticated access, privileged and non-privileged users must utilize multifactor authentication to prevent po...
V-215437
LOWMEDIUMHIGH
The AIX operating system must be configured to authenticate using Multi Factor Authentication.To assure accountability and prevent unauthenticated access, privileged and non-privileged users must utilize multifactor authentication to prevent po...
V-215438
LOWMEDIUMHIGH
The AIX operating system must be configured to use Multi Factor Authentication for remote connections.To assure accountability and prevent unauthenticated access, privileged and non-privileged users must utilize multifactor authentication to prevent po...
V-215439
LOWMEDIUMHIGH
AIX must have the have the PowerSC Multi Factor Authentication Product configured.To assure accountability and prevent unauthenticated access, privileged and non-privileged users must utilize multifactor authentication to prevent po...
V-215440
LOWMEDIUMHIGH
The AIX operating system must be configured to use a valid server_ca.pem file.To assure accountability and prevent unauthenticated access, privileged and non-privileged users must utilize multifactor authentication to prevent po...
V-215441
LOWMEDIUMHIGH
The AIX operating system must accept and verify Personal Identity Verification (PIV) credentials.The use of PIV credentials facilitates standardization and reduces the risk of unauthorized access. DoD has mandated the use of the CAC to support id...
V-219057
LOWMEDIUMHIGH
AIX must employ a deny-all, allow-by-exception firewall policy for allowing connections to other systems.Failure to restrict network connectivity only to authorized systems permits inbound connections from malicious systems. It also permits outbound conne...
V-219956
LOWMEDIUMHIGH
AIX must be configured so that the audit system takes appropriate action when the audit storage volume is full.Taking appropriate action in case of a filled audit storage volume will minimize the possibility of losing audit records....
V-245557
LOWMEDIUMHIGH
The AIX /etc/hosts file must be owned by root.Unauthorized ownership of the /etc/hosts file can lead to the ability for a malicious actor to redirect traffic to servers of their choice. It is also...
V-245558
LOWMEDIUMHIGH
The AIX /etc/hosts file must be group-owned by system.Unauthorized group ownership of the /etc/hosts file can lead to the ability for a malicious actor to redirect traffic to servers of their choice. It i...
V-245559
LOWMEDIUMHIGH
The AIX /etc/hosts file must have a mode of 0640 or less permissive.Unauthorized permissions of the /etc/hosts file can lead to the ability for a malicious actor to redirect traffic to servers of their choice. It is al...
V-245560
LOWMEDIUMHIGH
AIX cron and crontab directories must have a mode of 0640 or less permissive.Incorrect permissions of the cron or crontab directories could permit unauthorized users the ability to alter cron jobs and run automated jobs as priv...
V-245561
LOWMEDIUMHIGH
The AIX /etc/syslog.conf file must be owned by root.Unauthorized ownership of the /etc/syslog.conf file can lead to the ability for a malicious actor to alter or disrupt system logging activities. This ...
V-245562
LOWMEDIUMHIGH
The AIX /etc/syslog.conf file must be group-owned by system.Unauthorized group ownership of the /etc/syslog.conf file can lead to the ability for a malicious actor to alter or disrupt system logging activities....
V-245563
LOWMEDIUMHIGH
The AIX /etc/syslog.conf file must have a mode of 0640 or less permissive.Unauthorized permissions of the /etc/syslog.conf file can lead to the ability for a malicious actor to alter or disrupt system logging activities. Thi...
V-245564
LOWMEDIUMHIGH
The inetd.conf file on AIX must be group owned by the "system" group.Failure to give ownership of sensitive files or utilities to system groups may provide unauthorized users with the potential to access sensitive infor...
V-245565
LOWMEDIUMHIGH
The AIX /etc/inetd.conf file must have a mode of 0640 or less permissive.Failure to set proper permissions of sensitive files or utilities may provide unauthorized users with the potential to access sensitive information or...
V-245566
LOWMEDIUMHIGH
The AIX /var/spool/cron/atjobs directory must be owned by root or bin.Unauthorized ownership of the /var/spool/cron/atjobs directory could permit unauthorized users the ability to alter atjobs and run automated jobs as p...
V-245567
LOWMEDIUMHIGH
The AIX /var/spool/cron/atjobs directory must be group-owned by cron.Unauthorized group ownership of the /var/spool/cron/atjobs directory could permit unauthorized users the ability to alter atjobs and run automated job...
V-245568
LOWMEDIUMHIGH
The AIX /var/spool/cron/atjobs directory must have a mode of 0640 or less permissive.Incorrect permissions of the /var/spool/cron/atjobs directory could permit unauthorized users the ability to alter atjobs and run automated jobs as pr...
V-245569
LOWMEDIUMHIGH
The AIX cron and crontab directories must be group-owned by cron.Incorrect group ownership of the cron or crontab directories could permit unauthorized users the ability to alter cron jobs and run automated jobs as ...
V-215309
LOWMEDIUMHIGH
If bash is used, AIX must display logout messages.If a user cannot explicitly end an operating system session, the session may remain open and be exploited by an attacker; this is referred to as a zom...
V-215310
LOWMEDIUMHIGH
If Bourne / ksh shell is used, AIX must display logout messages.If a user cannot explicitly end an operating system session, the session may remain open and be exploited by an attacker; this is referred to as a zom...
V-215311
LOWMEDIUMHIGH
If csh/tcsh shell is used, AIX must display logout messages.If a user cannot explicitly end an operating system session, the session may remain open and be exploited by an attacker; this is referred to as a zom...
V-215412
LOWMEDIUMHIGH
If the AIX host is running an SMTP service, the SMTP greeting must not provide version information.The version of the SMTP service can be used by attackers to plan an attack based on vulnerabilities present in the specific version....
V-215413
LOWMEDIUMHIGH
AIX must contain no .forward files.The .forward file allows users to automatically forward mail to another system. Use of .forward files could allow the unauthorized forwarding of mail ...