DISA STIG AIX 7.x v2r5

Warning! Audit Deprecated

This audit file has been deprecated and will be removed in a future update.

View Next Version

Audit Details

Name: DISA STIG AIX 7.x v2r5

Updated: 10/17/2022

Authority: Operating Systems and Applications

Plugin: Unix

Revision: 1.1

Estimated Item Count: 454

Audit Items

DescriptionCategories
AIX7-00-001000 - AIX /etc/security/mkuser.sys.custom file must not exist unless it is needed for customizing a new user account.
AIX7-00-001001 - AIX must automatically remove or disable temporary user accounts after 72 hours or sooner.
AIX7-00-001003 - AIX must enforce the limit of three consecutive invalid login attempts by a user before the user account is locked and released by an administrator.
AIX7-00-001004 - AIX must limit the number of concurrent sessions to 10 for all accounts and/or account types.
AIX7-00-001006 - If the AIX system is using LDAP for authentication or account information, the LDAP SSL, or TLS connection must require the server provide a certificate and this certificate must have a valid path to a trusted CA - Certificate Issuer
AIX7-00-001006 - If the AIX system is using LDAP for authentication or account information, the LDAP SSL, or TLS connection must require the server provide a certificate and this certificate must have a valid path to a trusted CA - ldapsslkeyf
AIX7-00-001006 - If the AIX system is using LDAP for authentication or account information, the LDAP SSL, or TLS connection must require the server provide a certificate and this certificate must have a valid path to a trusted CA - useSSL
AIX7-00-001007 - If AIX is using LDAP for authentication or account information, the /etc/ldap.conf file (or equivalent) must not contain passwords - bindpwd DES
AIX7-00-001007 - If AIX is using LDAP for authentication or account information, the /etc/ldap.conf file (or equivalent) must not contain passwords - ldapsslkeypwd
AIX7-00-001008 - All accounts on AIX system must have unique account names.
AIX7-00-001009 - All accounts on AIX must be assigned unique User Identification Numbers (UIDs) and must authenticate organizational and non-organizational users (or processes acting on behalf of these users).
AIX7-00-001010 - The AIX SYSTEM attribute must not be set to NONE for any account.
AIX7-00-001011 - Direct logins to the AIX system must not be permitted to shared accounts, default accounts, application accounts, and utility accounts.
AIX7-00-001012 - AIX must use the SSH server to implement replay-resistant authentication mechanisms for network access to privileged and non-privileged accounts - lssrc sshd
AIX7-00-001012 - AIX must use the SSH server to implement replay-resistant authentication mechanisms for network access to privileged and non-privileged accounts - openssh.base.server
AIX7-00-001014 - The AIX system must automatically remove or disable emergency accounts after the crisis is resolved or 72 hours.
AIX7-00-001015 - The shipped /etc/security/mkuser.sys file on AIX must not be customized directly.
AIX7-00-001016 - The regular users default primary group must be staff (or equivalent) on AIX.
AIX7-00-001018 - All system files, programs, and directories must be owned by a system account - /bin
AIX7-00-001018 - All system files, programs, and directories must be owned by a system account - /etc
AIX7-00-001018 - All system files, programs, and directories must be owned by a system account - /sbin
AIX7-00-001018 - All system files, programs, and directories must be owned by a system account - /usr/bin
AIX7-00-001018 - All system files, programs, and directories must be owned by a system account - /usr/lbin
AIX7-00-001018 - All system files, programs, and directories must be owned by a system account - /usr/sbin
AIX7-00-001018 - All system files, programs, and directories must be owned by a system account - /usr/ucb
AIX7-00-001019 - AIX device files and directories must only be writable by users with a system account or as configured by the vendor - Type B
AIX7-00-001019 - AIX device files and directories must only be writable by users with a system account or as configured by the vendor - Type C
AIX7-00-001024 - SSH must display the date and time of the last successful account login to AIX system upon login.
AIX7-00-001025 - AIX must configure the ttys value for all interactive users - ALL users
AIX7-00-001025 - AIX must configure the ttys value for all interactive users - default user
AIX7-00-001028 - AIX must provide the lock command to let users retain their session lock until users are reauthenticated.
AIX7-00-001029 - AIX must provide xlock command in the CDE environment to let users retain their sessions lock until users are reauthenticated.
AIX7-00-001030 - AIX system must prevent the root account from directly logging in except from the system console.
AIX7-00-001031 - All AIX public directories must be owned by root or an application account.
AIX7-00-001032 - AIX administrative accounts must not run a web browser, except as needed for local service administration - mozilla
AIX7-00-001032 - AIX administrative accounts must not run a web browser, except as needed for local service administration - netscape
AIX7-00-001033 - AIX default system accounts (with the exception of root) must not be listed in the cron.allow file or must be included in the cron.deny file, if cron.allow does not exist - adm
AIX7-00-001033 - AIX default system accounts (with the exception of root) must not be listed in the cron.allow file or must be included in the cron.deny file, if cron.allow does not exist - bin
AIX7-00-001033 - AIX default system accounts (with the exception of root) must not be listed in the cron.allow file or must be included in the cron.deny file, if cron.allow does not exist - daemon
AIX7-00-001033 - AIX default system accounts (with the exception of root) must not be listed in the cron.allow file or must be included in the cron.deny file, if cron.allow does not exist - esaadmin
AIX7-00-001033 - AIX default system accounts (with the exception of root) must not be listed in the cron.allow file or must be included in the cron.deny file, if cron.allow does not exist - invscout
AIX7-00-001033 - AIX default system accounts (with the exception of root) must not be listed in the cron.allow file or must be included in the cron.deny file, if cron.allow does not exist - pconsole
AIX7-00-001033 - AIX default system accounts (with the exception of root) must not be listed in the cron.allow file or must be included in the cron.deny file, if cron.allow does not exist - snapp
AIX7-00-001033 - AIX default system accounts (with the exception of root) must not be listed in the cron.allow file or must be included in the cron.deny file, if cron.allow does not exist - sys
AIX7-00-001033 - AIX default system accounts (with the exception of root) must not be listed in the cron.allow file or must be included in the cron.deny file, if cron.allow does not exist - system
AIX7-00-001034 - The AIX root account must not have world-writable directories in its executable search path.
AIX7-00-001035 - The Group Identifiers (GIDs) reserved for AIX system accounts must not be assigned to non-system accounts as their primary group GID.
AIX7-00-001036 - UIDs reserved for system accounts must not be assigned to non-system accounts on AIX systems.
AIX7-00-001037 - The AIX root accounts list of preloaded libraries must be empty - /etc/hosts.deny
AIX7-00-001037 - The AIX root accounts list of preloaded libraries must be empty.