STIGQter STIGQter: STIG Summary: IBM AIX 7.x Security Technical Implementation Guide Version: 2 Release: 2 Benchmark Date: 23 Apr 2021:

The AIX operating system must be configured to use Multi Factor Authentication for remote connections.

DISA Rule

SV-215438r508663_rule

Vulnerability Number

V-215438

Group Title

SRG-OS-000480-GPOS-00227

Rule Version

AIX7-00-003202

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Add or update the following lines in the /etc/pam.conf file:

sshd auth required pam_ckfile
sshd auth required pam_permission file=/etc/security/access.conffound=allow
sshd auth required pam_pmfa /etc/security/pmfa/pam_pmfa.conf

Check Contents

Verify SSH is configured to use multi factor authentication:

# grep ^sshd /etc/pam.conf | head -3

sshd auth required pam_ckfile
sshd auth required pam_permission file=/etc/security/access.conf found=allow
sshd auth required pam_pmfa /etc/security/pmfa/pam_pmfa.conf

If the output does not match the above lines, any lines are missing, or commented out, this is a finding.

Vulnerability Number

V-215438

Documentable

False

Rule Version

AIX7-00-003202

Severity Override Guidance

Verify SSH is configured to use multi factor authentication:

# grep ^sshd /etc/pam.conf | head -3

sshd auth required pam_ckfile
sshd auth required pam_permission file=/etc/security/access.conf found=allow
sshd auth required pam_pmfa /etc/security/pmfa/pam_pmfa.conf

If the output does not match the above lines, any lines are missing, or commented out, this is a finding.

Check Content Reference

M

Target Key

4012

Comments