STIGQter STIGQter: STIG Summary:

IBM AIX 7.x Security Technical Implementation Guide

Version: 2

Release: 2 Benchmark Date: 23 Apr 2021

CheckedNameTitle
SV-215169r508663_ruleAIX /etc/security/mkuser.sys.custom file must not exist unless it is needed for customizing a new user account.
SV-215170r508663_ruleAIX must automatically remove or disable temporary user accounts after 72 hours or sooner.
SV-215171r508663_ruleAIX must enforce the limit of three consecutive invalid login attempts by a user before the user account is locked and released by an administrator.
SV-215172r508663_ruleAIX must limit the number of concurrent sessions to 10 for all accounts and/or account types.
SV-215173r508663_ruleIf the AIX system is using LDAP for authentication or account information, the LDAP SSL, or TLS connection must require the server provide a certificate and this certificate must have a valid path to a trusted CA.
SV-215174r508663_ruleIf AIX is using LDAP for authentication or account information, the /etc/ldap.conf file (or equivalent) must not contain passwords.
SV-215175r508663_ruleAll accounts on AIX system must have unique account names.
SV-215176r508663_ruleAll accounts on AIX must be assigned unique User Identification Numbers (UIDs) and must authenticate organizational and non-organizational users (or processes acting on behalf of these users).
SV-215177r508663_ruleThe AIX SYSTEM attribute must not be set to NONE for any account.
SV-215178r508663_ruleDirect logins to the AIX system must not be permitted to shared accounts, default accounts, application accounts, and utility accounts.
SV-215179r508663_ruleAIX must use the SSH server to implement replay-resistant authentication mechanisms for network access to privileged and non-privileged accounts.
SV-215180r508663_ruleThe AIX system must automatically remove or disable emergency accounts after the crisis is resolved or 72 hours.
SV-215181r508663_ruleThe shipped /etc/security/mkuser.sys file on AIX must not be customized directly.
SV-215182r508663_ruleThe regular users default primary group must be staff (or equivalent) on AIX.
SV-215183r508663_ruleAll system files, programs, and directories must be owned by a system account.
SV-215184r508663_ruleAIX device files and directories must only be writable by users with a system account or as configured by the vendor.
SV-215185r508663_ruleSSH must display the date and time of the last successful account login to AIX system upon login.
SV-215186r538429_ruleAIX must configure the ttys value for all interactive users.
SV-215187r508663_ruleAIX must provide the lock command to let users retain their session lock until users are reauthenticated.
SV-215188r508663_ruleAIX must provide xlock command in the CDE environment to let users retain their sessions lock until users are reauthenticated.
SV-215189r508663_ruleAIX system must prevent the root account from directly logging in except from the system console.
SV-215190r508663_ruleAll AIX public directories must be owned by root or an application account.
SV-215191r508663_ruleAIX administrative accounts must not run a web browser, except as needed for local service administration.
SV-215192r508663_ruleAIX default system accounts (with the exception of root) must not be listed in the cron.allow file or must be included in the cron.deny file, if cron.allow does not exist.
SV-215193r508663_ruleThe AIX root account must not have world-writable directories in its executable search path.
SV-215194r508663_ruleThe Group Identifiers (GIDs) reserved for AIX system accounts must not be assigned to non-system accounts as their primary group GID.
SV-215195r508663_ruleUIDs reserved for system accounts must not be assigned to non-system accounts on AIX systems.
SV-215196r508663_ruleThe AIX root accounts list of preloaded libraries must be empty.
SV-215197r508663_ruleAIX must not have accounts configured with blank or null passwords.
SV-215198r508663_ruleThe AIX root accounts home directory (other than /) must have mode 0700.
SV-215199r508663_ruleThe AIX root accounts home directory must not have an extended ACL.
SV-215200r508663_ruleAIX must display the Standard Mandatory DoD Notice and Consent Banner before granting local or remote login access to the system.
SV-215201r508663_ruleThe Department of Defense (DoD) login banner must be displayed immediately prior to, or as part of, graphical desktop environment login prompts on AIX.
SV-215202r508663_ruleThe Department of Defense (DoD) login banner must be displayed during SSH, sftp, and scp login sessions on AIX.
SV-215203r508663_ruleAny publically accessible connection to AIX operating system must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the system.
SV-215204r508663_ruleIF LDAP is used, AIX LDAP client must use SSL to authenticate with LDAP server.
SV-215205r508663_ruleIf LDAP authentication is required, AIX must setup LDAP client to refresh user and group caches less than a day.
SV-215206r508663_ruleThe AIX /etc/passwd, /etc/security/passwd, and/or /etc/group files must not contain a plus (+) without defining entries for NIS+ netgroups or LDAP netgroups.
SV-215207r508663_ruleAIX must protect the confidentiality and integrity of all information at rest.
SV-215208r508663_ruleAIX must provide time synchronization applications that can synchronize the system clock to external time sources at least every 24 hours.
SV-215209r508663_ruleAll AIX NFS anonymous UIDs and GIDs must be configured to values without permissions.
SV-215210r508663_ruleAIX nosuid option must be enabled on all NFS client mounts.
SV-215211r508663_ruleAIX must be configured to allow users to directly initiate a session lock for all connection types.
SV-215212r508663_ruleAIX CDE must conceal, via the session lock, information previously visible on the display with a publicly viewable image.
SV-215213r508663_ruleAIX must employ strong authenticators in the establishment of nonlocal maintenance and diagnostic sessions.
SV-215214r508663_ruleIf LDAP authentication is required on AIX, SSL must be used between LDAP clients and the LDAP servers to protect the integrity of remote access sessions.
SV-215215r508663_ruleAIX must only allow the use of DoD PKI-established certificate authorities for verification of the establishment of protected sessions.
SV-215216r517598_ruleAIX must implement NIST FIPS-validated cryptography for the following: to provision digital signatures, to generate cryptographic hashes, and to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
SV-215217r508663_ruleAIX must enforce password complexity by requiring that at least one upper-case character be used.
SV-215218r508663_ruleAIX must enforce password complexity by requiring that at least one lower-case character be used.
SV-215219r508663_ruleAIX must enforce password complexity by requiring that at least one numeric character be used.
SV-215220r508663_ruleAIX must require the change of at least 50% of the total number of characters when passwords are changed.
SV-215221r508663_ruleAIX root passwords must never be passed over a network in clear text form.
SV-215222r508663_ruleAIX Operating systems must enforce 24 hours/1 day as the minimum password lifetime.
SV-215223r508663_ruleAIX Operating systems must enforce a 60-day maximum password lifetime restriction.
SV-215224r508663_ruleAIX must prohibit password reuse for a minimum of five generations.
SV-215225r508663_ruleAIX must use Loadable Password Algorithm (LPA) password hashing algorithm.
SV-215226r508663_ruleAIX must enforce a minimum 15-character password length.
SV-215227r508663_ruleAIX must enforce password complexity by requiring that at least one special character be used.
SV-215228r508663_ruleAIX must implement a way to force an identified temporary user to renew their password at next login.
SV-215229r508663_ruleAIX must prevent the use of dictionary words for passwords.
SV-215230r508663_ruleThe password hashes stored on AIX system must have been generated using a FIPS 140-2 approved cryptographic hashing algorithm.
SV-215231r508663_ruleIf SNMP service is enabled on AIX, the default SNMP password must not be used in the /etc/snmpd.conf config file.
SV-215232r508663_ruleAIX must require passwords to contain no more than three consecutive repeating characters.
SV-215233r508663_ruleAIX must be able to control the ability of remote login for users.
SV-215234r508663_ruleNFS file systems on AIX must be mounted with the nosuid option unless the NFS file systems contain approved setuid or setgid programs.
SV-215235r508663_ruleAIX removable media, remote file systems, and any file system not containing approved device files must be mounted with the nodev option.
SV-215236r508663_ruleAIX must produce audit records containing information to establish what the date, time, and type of events that occurred.
SV-215237r508663_ruleAIX must produce audit records containing information to establish where the events occurred.
SV-215238r508663_ruleAIX must produce audit records containing information to establish the source and the identity of any individual or process associated with an event.
SV-215239r508663_ruleAIX must produce audit records containing information to establish the outcome of the events.
SV-215240r508663_ruleAIX must produce audit records containing the full-text recording of privileged commands.
SV-215241r508663_ruleAIX must be configured to generate an audit record when 75% of the audit file system is full.
SV-215242r517599_ruleAIX must provide the function to filter audit records for events of interest based upon all audit fields within audit records, support on-demand reporting requirements, and an audit reduction function that supports on-demand audit review and analysis and after-the-fact investigations of security incidents.
SV-215243r508663_ruleAudit logs on the AIX system must be owned by root.
SV-215244r508663_ruleAudit logs on the AIX system must be group-owned by system.
SV-215245r508663_ruleAudit logs on the AIX system must be set to 660 or less permissive.
SV-215246r508663_ruleAIX must provide audit record generation functionality for DoD-defined auditable events.
SV-215247r508663_ruleAIX must start audit at boot.
SV-215248r508663_ruleAIX audit tools must be owned by root.
SV-215249r508663_ruleAIX audit tools must be group-owned by audit.
SV-215250r508663_ruleAIX audit tools must be set to 4550 or less permissive.
SV-215251r508663_ruleAIX must verify the hash of audit tools.
SV-215252r508663_ruleAIX must provide the function for assigned ISSOs or designated SAs to change the auditing to be performed on all operating system components, based on all selectable event criteria in near real time.
SV-215253r508663_ruleAIX must allocate audit record storage capacity to store at least one weeks worth of audit records, when audit records are not immediately sent to a central audit record storage facility.
SV-215254r508663_ruleAIX must provide a report generation function that supports on-demand audit review and analysis, on-demand reporting requirements, and after-the-fact investigations of security incidents.
SV-215255r508663_ruleAIX must record time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT).
SV-215256r508663_ruleAIX audit logs must be rotated daily.
SV-215257r508663_ruleThe AIX rexec daemon must not be running.
SV-215258r508663_ruleAIX telnet daemon must not be running.
SV-215259r508663_ruleAIX ftpd daemon must not be running.
SV-215260r508663_ruleAIX must remove NOPASSWD tag from sudo config files.
SV-215261r508663_ruleAIX must remove !authenticate option from sudo config files.
SV-215262r508663_ruleAIX must be configured with a default gateway for IPv4 if the system uses IPv4, unless the system is a router.
SV-215263r508663_ruleIP forwarding for IPv4 must not be enabled on AIX unless the system is a router.
SV-215264r508663_ruleAIX must be configured with a default gateway for IPv6 if the system uses IPv6 unless the system is a router.
SV-215265r508663_ruleAIX must not have IP forwarding for IPv6 enabled unless the system is an IPv6 router.
SV-215266r508663_ruleAIX log files must be owned by a system account.
SV-215267r508663_ruleAIX log files must be owned by a system group.
SV-215268r508663_ruleAIX system files, programs, and directories must be group-owned by a system group.
SV-215269r508663_ruleThe inetd.conf file on AIX must be owned by root and system group.
SV-215270r508663_ruleAIX cron and crontab directories must be owned by root or bin.
SV-215271r508663_ruleAIX audio devices must be group-owned by root, sys, bin, or system.
SV-215272r508663_ruleAIX time synchronization configuration file must be owned by root.
SV-215273r508663_ruleAIX time synchronization configuration file must be group-owned by bin, or system.
SV-215274r508663_ruleThe AIX /etc/group file must be owned by root.
SV-215275r508663_ruleThe AIX /etc/group file must be group-owned by security.
SV-215276r508663_ruleAll AIX interactive users home directories must be owned by their respective users.
SV-215277r508663_ruleAll AIX interactive users home directories must be group-owned by the home directory owner primary group.
SV-215278r508663_ruleAll files and directories contained in users home directories on AIX must be group-owned by a group in which the home directory owner is a member.
SV-215279r508663_ruleAIX library files must have mode 0755 or less permissive.
SV-215280r508663_ruleSamba packages must be removed from AIX.
SV-215281r508663_ruleAIX time synchronization configuration file must have mode 0640 or less permissive.
SV-215282r508663_ruleThe AIX /etc/group file must have mode 0644 or less permissive.
SV-215283r508663_ruleAIX must encrypt user data at rest using AIX Encrypted File System (EFS) if it is required.
SV-215284r508663_ruleAIX must protect the confidentiality and integrity of transmitted information during preparation for transmission and maintain the confidentiality and integrity of information during reception and disable all non-encryption network access methods.
SV-215285r508663_ruleAIX must monitor and record successful remote logins.
SV-215286r508663_ruleAIX must monitor and record unsuccessful remote logins.
SV-215287r508663_ruleOn AIX, the SSH server must not permit root logins using remote access programs.
SV-215288r508663_ruleAll AIX shells referenced in passwd file must be listed in /etc/shells file, except any shells specified for the purpose of preventing logins.
SV-215289r508663_ruleThe AIX SSH server must use SSH Protocol 2.
SV-215290r648727_ruleAIX must config the SSH idle timeout interval.
SV-215291r508663_ruleAIX must disable Kerberos Authentication in ssh config file to enforce access restrictions.
SV-215292r508663_ruleIf GSSAPI authentication is not required on AIX, the SSH daemon must disable GSSAPI authentication.
SV-215293r508663_ruleAIX must setup SSH daemon to disable revoked public keys.
SV-215294r508663_ruleAIX SSH daemon must be configured to only use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hash algorithms.
SV-215295r508663_ruleThe AIX SSH daemon must be configured for IP filtering.
SV-215296r508663_ruleThe AIX SSH daemon must not allow compression.
SV-215297r508663_ruleAIX must turn on SSH daemon privilege separation.
SV-215298r508663_ruleAIX must turn on SSH daemon reverse name checking.
SV-215299r508663_ruleAIX SSH daemon must perform strict mode checking of home directory configuration files.
SV-215300r508663_ruleAIX must turn off X11 forwarding for the SSH daemon.
SV-215301r508663_ruleAIX must turn off TCP forwarding for the SSH daemon.
SV-215302r508663_ruleThe AIX SSH daemon must be configured to disable empty passwords.
SV-215303r508663_ruleThe AIX SSH daemon must be configured to disable user .rhosts files.
SV-215304r508663_ruleThe AIX SSH daemon must be configured to not use host-based authentication.
SV-215305r508663_ruleThe AIX SSH daemon must not allow RhostsRSAAuthentication.
SV-215306r508663_ruleIf AIX SSH daemon is required, the SSH daemon must only listen on the approved listening IP addresses.
SV-215307r508663_ruleAIX must request and perform data origin and integrity authentication verification on the name/address resolution responses the system receives from authoritative sources.
SV-215308r508663_ruleAIX system must require authentication upon booting into single-user and maintenance modes.
SV-215309r508663_ruleIf bash is used, AIX must display logout messages.
SV-215310r508663_ruleIf Bourne / ksh shell is used, AIX must display logout messages.
SV-215311r508663_ruleIf csh/tcsh shell is used, AIX must display logout messages.
SV-215312r508663_ruleAIX must implement a remote syslog server that is documented using site-defined procedures.
SV-215313r508663_ruleThe AIX syslog daemon must not accept remote messages unless it is a syslog server documented using site-defined procedures.
SV-215314r508663_ruleAIX must be configured to use syslogd to log events by TCPD.
SV-215315r508663_ruleThe AIX audit configuration files must be owned by root.
SV-215316r508663_ruleThe AIX audit configuration files must be group-owned by audit.
SV-215317r508663_ruleThe AIX audit configuration files must be set to 640 or less permissive.
SV-215318r508663_ruleAIX must automatically lock after 15 minutes of inactivity in the CDE Graphical desktop environment.
SV-215320r508663_ruleAIX must set inactivity time-out on login sessions and terminate all login sessions after 10 minutes of inactivity.
SV-215321r508663_ruleAIX SSH private host key files must have mode 0600 or less permissive.
SV-215322r508663_ruleAIX must disable /usr/bin/rcp, /usr/bin/rlogin, /usr/bin/rsh, /usr/bin/rexec and /usr/bin/telnet commands.
SV-215323r508663_ruleAIX log files must have mode 0640 or less permissive.
SV-215324r508663_ruleAIX log files must not have extended ACLs, except as needed to support authorized software.
SV-215325r508663_ruleAll system command files must not have extended ACLs.
SV-215326r508663_ruleAll library files must not have extended ACLs.
SV-215327r508663_ruleAIX passwd.nntp file must have mode 0600 or less permissive.
SV-215328r508663_ruleThe AIX /etc/group file must not have an extended ACL.
SV-215329r508663_ruleThe AIX ldd command must be disabled.
SV-215330r508663_ruleAIX NFS server must be configured to restrict file system access to local hosts.
SV-215331r508663_ruleAll AIX users home directories must have mode 0750 or less permissive.
SV-215332r508663_ruleThe AIX user home directories must not have extended ACLs.
SV-215333r508663_ruleAIX must use Trusted Execution (TE) Check policy.
SV-215334r508663_ruleAIX must disable trivial file transfer protocol.
SV-215335r508663_ruleAIX must employ a deny-all, permit-by-exception policy to allow the execution of authorized software programs.
SV-215336r508663_ruleAIX must remove all software components after updated versions have been installed.
SV-215337r508663_ruleAIX must enforce a delay of at least 4 seconds between login prompts following a failed login attempt.
SV-215338r508663_ruleAIX system must restrict the ability to switch to the root user to members of a defined group.
SV-215339r508663_ruleAll AIX Group Identifiers (GIDs) referenced in the /etc/passwd file must be defined in the /etc/group file.
SV-215340r508663_ruleAll AIX files and directories must have a valid owner.
SV-215341r508663_ruleThe sticky bit must be set on all public directories on AIX systems.
SV-215342r508663_ruleThe AIX global initialization files must contain the mesg -n or mesg n commands.
SV-215343r508663_ruleThe AIX hosts.lpd file must not contain a + character.
SV-215344r508663_ruleAIX sendmail logging must not be set to less than nine in the sendmail.cf file.
SV-215345r508663_ruleAIX run control scripts executable search paths must contain only absolute paths.
SV-215346r508663_ruleThe AIX rsh daemon must be disabled.
SV-215347r508663_ruleThe AIX rlogind service must be disabled.
SV-215348r508663_ruleThe AIX qdaemon must be disabled if local or remote printing is not required.
SV-215349r508663_ruleIf AIX system does not act as a remote print server for other servers, the lpd daemon must be disabled.
SV-215350r508663_ruleIf AIX system does not support either local or remote printing, the piobe service must be disabled.
SV-215351r508663_ruleIf there are no X11 clients that require CDE on AIX, the dt service must be disabled.
SV-215352r508663_ruleIf NFS is not required on AIX, the NFS daemon must be disabled.
SV-215353r508663_ruleIf sendmail is not required on AIX, the sendmail service must be disabled.
SV-215354r508663_ruleIf SNMP is not required on AIX, the snmpd service must be disabled.
SV-215355r508663_ruleThe AIX DHCP client must be disabled.
SV-215356r508663_ruleIf DHCP is not enabled in the network on AIX, the dhcprd daemon must be disabled.
SV-215357r513945_ruleIf IPv6 is not utilized on AIX server, the autoconf6 daemon must be disabled.
SV-215358r508663_ruleIf AIX server is not functioning as a network router, the gated daemon must be disabled.
SV-215359r508663_ruleIf AIX server is not functioning as a multicast router, the mrouted daemon must be disabled.
SV-215360r508663_ruleIf AIX server is not functioning as a DNS server, the named daemon must be disabled.
SV-215361r508663_ruleIf AIX server is not functioning as a network router, the routed daemon must be disabled.
SV-215362r508663_ruleIf rwhod is not required on AIX, the rwhod daemon must be disabled.
SV-215363r508663_ruleThe timed daemon must be disabled on AIX.
SV-215364r508663_ruleIf AIX server does not host an SNMP agent, the dpid2 daemon must be disabled.
SV-215365r508663_ruleIf SNMP is not required on AIX, the snmpmibd daemon must be disabled.
SV-215366r508663_ruleThe aixmibd daemon must be disabled on AIX.
SV-215367r508663_ruleThe ndpd-host daemon must be disabled on AIX.
SV-215368r508663_ruleThe ndpd-router must be disabled on AIX.
SV-215369r508663_ruleThe daytime daemon must be disabled on AIX.
SV-215370r508663_ruleThe cmsd daemon must be disabled on AIX.
SV-215371r508663_ruleThe ttdbserver daemon must be disabled on AIX.
SV-215372r508663_ruleThe uucp (UNIX to UNIX Copy Program) daemon must be disabled on AIX.
SV-215373r508663_ruleThe time daemon must be disabled on AIX.
SV-215374r508663_ruleThe talk daemon must be disabled on AIX.
SV-215375r508663_ruleThe ntalk daemon must be disabled on AIX.
SV-215376r508663_ruleThe chargen daemon must be disabled on AIX.
SV-215377r508663_ruleThe discard daemon must be disabled on AIX.
SV-215378r508663_ruleThe dtspc daemon must be disabled on AIX.
SV-215379r508663_ruleThe pcnfsd daemon must be disabled on AIX.
SV-215380r508663_ruleThe rstatd daemon must be disabled on AIX.
SV-215381r508663_ruleThe rusersd daemon must be disabled on AIX.
SV-215382r508663_ruleThe sprayd daemon must be disabled on AIX.
SV-215383r508663_ruleThe klogin daemon must be disabled on AIX.
SV-215384r508663_ruleThe kshell daemon must be disabled on AIX.
SV-215385r508663_ruleThe rquotad daemon must be disabled on AIX.
SV-215386r508663_ruleThe tftp daemon must be disabled on AIX.
SV-215387r508663_ruleThe imap2 service must be disabled on AIX.
SV-215388r508663_ruleThe pop3 daemon must be disabled on AIX.
SV-215389r508663_ruleThe finger daemon must be disabled on AIX.
SV-215390r508663_ruleThe instsrv daemon must be disabled on AIX.
SV-215391r508663_ruleThe echo daemon must be disabled on AIX.
SV-215392r508663_ruleThe Internet Network News (INN) server must be disabled on AIX.
SV-215393r508663_ruleIf Stream Control Transmission Protocol (SCTP) must be disabled on AIX.
SV-215394r508663_ruleThe Reliable Datagram Sockets (RDS) protocol must be disabled on AIX.
SV-215395r508663_ruleIf automated file system mounting tool is not required on AIX, it must be disabled.
SV-215396r508663_ruleAIX process core dumps must be disabled.
SV-215397r508663_ruleAIX kernel core dumps must be disabled unless needed.
SV-215398r508663_ruleAIX must set Stack Execution Disable (SED) system wide mode to all.
SV-215399r508663_ruleAIX must protect against or limit the effects of Denial of Service (DoS) attacks by ensuring AIX is implementing rate-limiting measures on impacted network interfaces.
SV-215400r508663_ruleAIX must allow admins to send a message to all the users who logged in currently.
SV-215401r508663_ruleAIX must allow admins to send a message to a user who logged in currently.
SV-215402r508663_ruleThe AIX SSH daemon must be configured to only use FIPS 140-2 approved ciphers.
SV-215403r508663_ruleThe AIX system must have no .netrc files on the system.
SV-215404r513948_ruleAIX must turn on enhanced Role-Based Access Control (RBAC) to isolate security functions from nonsecurity functions, to grant system privileges to other operating system admins, and prohibit user installation of system software without explicit privileged status.
SV-215405r508663_ruleIf DHCP server is not required on AIX, the DHCP server must be disabled.
SV-215406r508663_ruleThe rwalld daemon must be disabled on AIX.
SV-215407r508663_ruleIn the event of a system failure, AIX must preserve any information necessary to determine cause of failure and any information necessary to return to operations with least disruption to mission processes.
SV-215408r508663_ruleThe /etc/shells file must exist on AIX systems.
SV-215409r508663_ruleAIX public directories must be the only world-writable directories and world-writable files must be located only in public directories.
SV-215410r508663_ruleAIX must be configured to only boot from the system boot device.
SV-215411r508663_ruleAIX must not use removable media as the boot loader.
SV-215412r508663_ruleIf the AIX host is running an SMTP service, the SMTP greeting must not provide version information.
SV-215413r508663_ruleAIX must contain no .forward files.
SV-215414r508663_ruleThe sendmail server must have the debug feature disabled on AIX systems.
SV-215415r508663_ruleSMTP service must not have the EXPN or VRFY features active on AIX systems.
SV-215416r508663_ruleAll global initialization file executable search paths must contain only absolute paths.
SV-215417r508663_ruleThe SMTP service HELP command must not be enabled on AIX.
SV-215418r508663_ruleNIS maps must be protected through hard-to-guess domain names on AIX.
SV-215419r508663_ruleThe AIX systems access control program must be configured to grant or deny system access to specific hosts.
SV-215420r508663_ruleAll AIX files and directories must have a valid group owner.
SV-215421r508663_ruleAIX control scripts library search paths must contain only absolute paths.
SV-215422r508663_ruleThe control script lists of preloaded libraries must contain only absolute paths on AIX systems.
SV-215423r508663_ruleThe global initialization file lists of preloaded libraries must contain only absolute paths on AIX.
SV-215424r508663_ruleThe local initialization file library search paths must contain only absolute paths on AIX.
SV-215425r508663_ruleThe local initialization file lists of preloaded libraries must contain only absolute paths on AIX.
SV-215426r508663_ruleAIX package management tool must be used daily to verify system software.
SV-215427r508663_ruleThe AIX DHCP client must not send dynamic DNS updates.
SV-215428r508663_ruleAIX must not run any routing protocol daemons unless the system is a router.
SV-215429r508663_ruleAIX must not process ICMP timestamp requests.
SV-215430r508663_ruleAIX must not respond to ICMPv6 echo requests sent to a broadcast address.
SV-215431r508663_ruleAIX must define default permissions for all authenticated users in such a way that the user can only read and modify their own files.
SV-215432r508663_ruleThere must be no .rhosts, .shosts, hosts.equiv, or shosts.equiv files on the AIX system.
SV-215433r508663_ruleThe .rhosts file must not be supported in AIX PAM.
SV-215434r508663_ruleThe AIX root user home directory must not be the root directory (/).
SV-215435r508663_ruleAll AIX interactive users must be assigned a home directory in the passwd file and the directory must exist.
SV-215436r508663_ruleThe AIX operating system must use Multi Factor Authentication.
SV-215437r508663_ruleThe AIX operating system must be configured to authenticate using Multi Factor Authentication.
SV-215438r508663_ruleThe AIX operating system must be configured to use Multi Factor Authentication for remote connections.
SV-215439r508663_ruleAIX must have the have the PowerSC Multi Factor Authentication Product configured.
SV-215440r508663_ruleThe AIX operating system must be configured to use a valid server_ca.pem file.
SV-215441r508663_ruleThe AIX operating system must accept and verify Personal Identity Verification (PIV) credentials.
SV-219057r508663_ruleAIX must employ a deny-all, allow-by-exception firewall policy for allowing connections to other systems.
SV-219956r508663_ruleAIX must be configured so that the audit system takes appropriate action when the audit storage volume is full.