STIGQter STIGQter: STIG Summary: IBM AIX 7.x Security Technical Implementation Guide Version: 2 Release: 2 Benchmark Date: 23 Apr 2021:

On AIX, the SSH server must not permit root logins using remote access programs.

DISA Rule

SV-215287r508663_rule

Vulnerability Number

V-215287

Group Title

SRG-OS-000480-GPOS-00227

Rule Version

AIX7-00-002102

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Edit the "/etc/ssh/sshd_config" file to have the following line and save the change:
PermitRootLogin no

Restart SSH daemon:
# stopsrc -s sshd
# startsrc -s sshd

Check Contents

Determine if the SSH daemon is configured to disable root logins:
# grep -iE "PermitRootLogin[[:blank:]]*no" /etc/ssh/sshd_config | grep -v \#

If the above command displays a line, the root login is disabled.

If the root login is not disabled, this is a finding.

Vulnerability Number

V-215287

Documentable

False

Rule Version

AIX7-00-002102

Severity Override Guidance

Determine if the SSH daemon is configured to disable root logins:
# grep -iE "PermitRootLogin[[:blank:]]*no" /etc/ssh/sshd_config | grep -v \#

If the above command displays a line, the root login is disabled.

If the root login is not disabled, this is a finding.

Check Content Reference

M

Target Key

4012

Comments