CIS IBM AIX 7 v1.0.0 L1

Warning! Audit Deprecated

This audit file has been deprecated and will be removed in a future update.

View Next Version

Audit Details

Name: CIS IBM AIX 7 v1.0.0 L1

Updated: 9/12/2025

Authority: CIS

Plugin: Unix

Revision: 1.2

Estimated Item Count: 208

File Details

Filename: CIS_IBM_AIX_7_v1.0.0_L1.audit

Size: 348 kB

MD5: bff2fd8f718f4c7826bcbfde46de1e4e
SHA256: 2e833c608b3b9f6113e3c4160f14d25843627e10f538cc0f9ffaaf3a139f9568

Audit Items

DescriptionCategories
2.1.2 Ensure Unauthorized Applications are reported
2.2 Ensure system configuration is documented and verified regularly
2.4 Ensure unused symbolic links are removed
3.1 Ensure default user umask is configured
3.2 Ensure group write permission are removed from default groups
3.3 Ensure world writable directories have the SVTX bit set
3.5 Ensure world writable files are secured
3.6 Ensure there are no group "staff" writable files
3.7 Ensure no files or directories without an owner and a group exist
4.1.1.1 Ensure access on /smit.log is configured
4.1.1.2 Ensure access on /etc/group is configured
4.1.1.3 Ensure access on /etc/inetd.conf is configured
4.1.1.4 Ensure access on /etc/motd is configured
4.1.1.5 Ensure access on /etc/passwd is configured
4.1.1.6 Ensure /etc/mail/submit.cf access is configured
4.1.1.7 Ensure access to /etc/ssh/ssh_banner is configured
4.1.1.8 Ensure access on /etc/ssh/ssh_config is configured
4.1.1.9 Ensure access on /etc/ssh/sshd_config is configured
4.1.1.10 Ensure access on /var/adm/cron/at.allow is configured
4.1.1.11 Ensure access on /var/adm/cron/cron.allow is configured
4.1.1.12 Ensure access on /var/adm/cron/log is configured
4.1.1.13 Ensure access on /var/ct/RMstart.log is configured
4.1.1.14 Ensure access on /var/tmp/dpid2.log is configured
4.1.1.15 Ensure access on /var/tmp/hostmibd.log is configured
4.1.1.16 Ensure access on /var/tmp/snmpd.log is configured
4.1.1.17 Ensure crontab is restricted to authorized users
4.1.1.18 Ensure Home directory configuration file access is configured
4.1.1.19 Ensure SUID and SGID files are reviewed
4.1.2.1 Ensure local user Home directories exists
4.1.2.2 Ensure Home directories access is configured
4.1.2.3 Ensure Home directory write access is restricted to owner
4.1.2.4 Ensure access on /audit and /etc/security/audit is configured
4.1.2.5 Ensure access to /etc/security is configured
4.1.2.6 Ensure access on /var/adm/ras is configured
4.1.2.7 Ensure access on /var/adm/sa is configured
4.1.2.8 Ensure access on /var/spool/cron/crontabs is configured
4.1.2.9 Ensure all directories in root PATH access is configured
4.1.2.10 Ensure root user has a dedicated home directory
4.2.1 Ensure sendmail in not in use
4.2.2 Ensure NIS client is not installed
4.2.3 Ensure NIS server services are not in use
4.2.4 Ensure legacy NIS markers are removed
4.2.7 Ensure legacy remote daemon support is not available
4.2.8 Ensure snmpd is not available
4.3.1.1 Ensure writesrv service is not in use
4.3.1.2 Ensure dt service is not in use
4.3.1.3 Ensure piobe service is not in use
4.3.1.4 Ensure qdaemon service is not in use
4.3.1.5 Ensure rcnfs service is not in use
4.3.2.1 Ensure inetd daemon is disabled when no additional services are required