CIS IBM AIX 7 v1.0.0 L1

Audit Details

Name: CIS IBM AIX 7 v1.0.0 L1

Updated: 1/6/2025

Authority: CIS

Plugin: Unix

Revision: 1.1

Estimated Item Count: 208

File Details

Filename: CIS_IBM_AIX_7_v1.0.0_L1.audit

Size: 461 kB

MD5: 86b820a26179a1b512b117cf435f7f22
SHA256: 7c5387d1d29b3657420bdd4a33d650e8b67e74e00367bd5eb1f7ac9bd67c3919

Audit Items

DescriptionCategories
2.1.2 Ensure Unauthorized Applications are reported

CONFIGURATION MANAGEMENT

2.2 Ensure system configuration is documented and verified regularly

CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT

2.4 Ensure unused symbolic links are removed

CONFIGURATION MANAGEMENT

3.1 Ensure default user umask is configured

ACCESS CONTROL, MEDIA PROTECTION

3.2 Ensure group write permission are removed from default groups

ACCESS CONTROL, MEDIA PROTECTION

3.3 Ensure world writable directories have the SVTX bit set

ACCESS CONTROL, MEDIA PROTECTION

3.5 Ensure world writable files are secured

ACCESS CONTROL, MEDIA PROTECTION

3.6 Ensure there are no group "staff" writable files

ACCESS CONTROL, MEDIA PROTECTION

3.7 Ensure no files or directories without an owner and a group exist

MEDIA PROTECTION

4.1.1.1 Ensure access on /smit.log is configured

ACCESS CONTROL, MEDIA PROTECTION

4.1.1.2 Ensure access on /etc/group is configured

ACCESS CONTROL, MEDIA PROTECTION

4.1.1.3 Ensure access on /etc/inetd.conf is configured

ACCESS CONTROL, MEDIA PROTECTION

4.1.1.4 Ensure access on /etc/motd is configured

ACCESS CONTROL, MEDIA PROTECTION

4.1.1.5 Ensure access on /etc/passwd is configured

ACCESS CONTROL, MEDIA PROTECTION

4.1.1.6 Ensure /etc/mail/submit.cf access is configured

ACCESS CONTROL, MEDIA PROTECTION

4.1.1.7 Ensure access to /etc/ssh/ssh_banner is configured

ACCESS CONTROL, MEDIA PROTECTION

4.1.1.8 Ensure access on /etc/ssh/ssh_config is configured

ACCESS CONTROL, MEDIA PROTECTION

4.1.1.9 Ensure access on /etc/ssh/sshd_config is configured

ACCESS CONTROL, MEDIA PROTECTION

4.1.1.10 Ensure access on /var/adm/cron/at.allow is configured

ACCESS CONTROL

4.1.1.11 Ensure access on /var/adm/cron/cron.allow is configured

ACCESS CONTROL, MEDIA PROTECTION

4.1.1.12 Ensure access on /var/adm/cron/log is configured

ACCESS CONTROL, MEDIA PROTECTION

4.1.1.13 Ensure access on /var/ct/RMstart.log is configured

ACCESS CONTROL, MEDIA PROTECTION

4.1.1.14 Ensure access on /var/tmp/dpid2.log is configured

ACCESS CONTROL, MEDIA PROTECTION

4.1.1.15 Ensure access on /var/tmp/hostmibd.log is configured

ACCESS CONTROL, MEDIA PROTECTION

4.1.1.16 Ensure access on /var/tmp/snmpd.log is configured

ACCESS CONTROL, MEDIA PROTECTION

4.1.1.17 Ensure crontab is restricted to authorized users

ACCESS CONTROL, MEDIA PROTECTION

4.1.1.18 Ensure Home directory configuration file access is configured

ACCESS CONTROL, MEDIA PROTECTION

4.1.1.19 Ensure SUID and SGID files are reviewed

ACCESS CONTROL, MEDIA PROTECTION

4.1.2.1 Ensure local user Home directories exists

ACCESS CONTROL, MEDIA PROTECTION

4.1.2.2 Ensure Home directories access is configured

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

4.1.2.3 Ensure Home directory write access is restricted to owner

ACCESS CONTROL, MEDIA PROTECTION

4.1.2.4 Ensure access on /audit and /etc/security/audit is configured

ACCESS CONTROL, MEDIA PROTECTION

4.1.2.5 Ensure access to /etc/security is configured

ACCESS CONTROL, MEDIA PROTECTION

4.1.2.6 Ensure access on /var/adm/ras is configured

ACCESS CONTROL, MEDIA PROTECTION

4.1.2.7 Ensure access on /var/adm/sa is configured

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

4.1.2.8 Ensure access on /var/spool/cron/crontabs is configured

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

4.1.2.9 Ensure all directories in root PATH access is configured

ACCESS CONTROL, MEDIA PROTECTION

4.1.2.10 Ensure root user has a dedicated home directory

ACCESS CONTROL, MEDIA PROTECTION

4.2.1 Ensure sendmail in not in use

CONFIGURATION MANAGEMENT

4.2.2 Ensure NIS client is not installed

CONFIGURATION MANAGEMENT

4.2.3 Ensure NIS server services are not in use

CONFIGURATION MANAGEMENT

4.2.4 Ensure legacy NIS markers are removed

ACCESS CONTROL, MEDIA PROTECTION

4.2.7 Ensure legacy remote daemon support is not available

CONFIGURATION MANAGEMENT

4.2.8 Ensure snmpd is not available

CONFIGURATION MANAGEMENT

4.3.1.1 Ensure writesrv service is not in use

CONFIGURATION MANAGEMENT

4.3.1.2 Ensure dt service is not in use

CONFIGURATION MANAGEMENT

4.3.1.3 Ensure piobe service is not in use

CONFIGURATION MANAGEMENT

4.3.1.4 Ensure qdaemon service is not in use

CONFIGURATION MANAGEMENT

4.3.1.5 Ensure rcnfs service is not in use

CONFIGURATION MANAGEMENT

4.3.2.1 Ensure inetd daemon is disabled when no additional services are required

CONFIGURATION MANAGEMENT