DISA STIG AIX 7.x v2r8

Warning! Audit Deprecated

This audit file has been deprecated and will be removed in a future update.

View Next Version

Audit Details

Name: DISA STIG AIX 7.x v2r8

Updated: 1/29/2024

Authority: DISA STIG

Plugin: Unix

Revision: 1.1

Estimated Item Count: 311

File Details

Filename: DISA_STIG_AIX_7.x_v2r8.audit

Size: 564 kB

MD5: b7bd7b009d7da4e1b6ce1bc4d6a66b66
SHA256: 02b0e3ceacdcb22a10350d6626c28aa164018d085dc326339c2226cbda2ae179

Audit Items

DescriptionCategories
AIX7-00-001000 - AIX /etc/security/mkuser.sys.custom file must not exist unless it is needed for customizing a new user account.
AIX7-00-001001 - AIX must automatically remove or disable temporary user accounts after 72 hours or sooner.
AIX7-00-001003 - AIX must enforce the limit of three consecutive invalid login attempts by a user before the user account is locked and released by an administrator.
AIX7-00-001004 - AIX must limit the number of concurrent sessions to 10 for all accounts and/or account types.
AIX7-00-001006 - If the AIX system is using LDAP for authentication or account information, the LDAP SSL, or TLS connection must require the server provide a certificate and this certificate must have a valid path to a trusted CA - Certificate Issuer
AIX7-00-001006 - If the AIX system is using LDAP for authentication or account information, the LDAP SSL, or TLS connection must require the server provide a certificate and this certificate must have a valid path to a trusted CA - ldapsslkeyf
AIX7-00-001006 - If the AIX system is using LDAP for authentication or account information, the LDAP SSL, or TLS connection must require the server provide a certificate and this certificate must have a valid path to a trusted CA - useSSL
AIX7-00-001007 - If AIX is using LDAP for authentication or account information, the /etc/ldap.conf file (or equivalent) must not contain passwords - bindpwd DES
AIX7-00-001007 - If AIX is using LDAP for authentication or account information, the /etc/ldap.conf file (or equivalent) must not contain passwords - ldapsslkeypwd
AIX7-00-001008 - All accounts on AIX system must have unique account names.
AIX7-00-001009 - All accounts on AIX must be assigned unique User Identification Numbers (UIDs) and must authenticate organizational and non-organizational users (or processes acting on behalf of these users).
AIX7-00-001010 - The AIX SYSTEM attribute must not be set to NONE for any account.
AIX7-00-001011 - Direct logins to the AIX system must not be permitted to shared accounts, default accounts, application accounts, and utility accounts.
AIX7-00-001012 - AIX must use the SSH server to implement replay-resistant authentication mechanisms for network access to privileged and non-privileged accounts
AIX7-00-001014 - The AIX system must automatically remove or disable emergency accounts after the crisis is resolved or 72 hours.
AIX7-00-001015 - The shipped /etc/security/mkuser.sys file on AIX must not be customized directly.
AIX7-00-001016 - The regular users default primary group must be staff (or equivalent) on AIX.
AIX7-00-001018 - All system files, programs, and directories must be owned by a system account
AIX7-00-001019 - AIX device files and directories must only be writable by users with a system account or as configured by the vendor
AIX7-00-001025 - AIX must configure the ttys value for all interactive users
AIX7-00-001028 - AIX must provide the lock command to let users retain their session lock until users are reauthenticated.
AIX7-00-001029 - AIX must provide xlock command in the CDE environment to let users retain their sessions lock until users are reauthenticated.
AIX7-00-001030 - AIX system must prevent the root account from directly logging in except from the system console.
AIX7-00-001031 - All AIX public directories must be owned by root or an application account.
AIX7-00-001032 - AIX administrative accounts must not run a web browser, except as needed for local service administration
AIX7-00-001033 - AIX default system accounts (with the exception of root) must not be listed in the cron.allow file or must be included in the cron.deny file, if cron.allow does not exist - adm
AIX7-00-001033 - AIX default system accounts (with the exception of root) must not be listed in the cron.allow file or must be included in the cron.deny file, if cron.allow does not exist - bin
AIX7-00-001033 - AIX default system accounts (with the exception of root) must not be listed in the cron.allow file or must be included in the cron.deny file, if cron.allow does not exist - daemon
AIX7-00-001033 - AIX default system accounts (with the exception of root) must not be listed in the cron.allow file or must be included in the cron.deny file, if cron.allow does not exist - esaadmin
AIX7-00-001033 - AIX default system accounts (with the exception of root) must not be listed in the cron.allow file or must be included in the cron.deny file, if cron.allow does not exist - invscout
AIX7-00-001033 - AIX default system accounts (with the exception of root) must not be listed in the cron.allow file or must be included in the cron.deny file, if cron.allow does not exist - pconsole
AIX7-00-001033 - AIX default system accounts (with the exception of root) must not be listed in the cron.allow file or must be included in the cron.deny file, if cron.allow does not exist - snapp
AIX7-00-001033 - AIX default system accounts (with the exception of root) must not be listed in the cron.allow file or must be included in the cron.deny file, if cron.allow does not exist - sys
AIX7-00-001033 - AIX default system accounts (with the exception of root) must not be listed in the cron.allow file or must be included in the cron.deny file, if cron.allow does not exist - system
AIX7-00-001034 - The AIX root account must not have world-writable directories in its executable search path.
AIX7-00-001035 - The Group Identifiers (GIDs) reserved for AIX system accounts must not be assigned to non-system accounts as their primary group GID.
AIX7-00-001036 - UIDs reserved for system accounts must not be assigned to non-system accounts on AIX systems.
AIX7-00-001037 - The AIX root accounts list of preloaded libraries must be empty - /etc/hosts.deny
AIX7-00-001037 - The AIX root accounts list of preloaded libraries must be empty.
AIX7-00-001038 - AIX must not have accounts configured with blank or null passwords.
AIX7-00-001039 - The AIX root accounts home directory (other than /) must have mode 0700.
AIX7-00-001040 - The AIX root accounts home directory must not have an extended ACL.
AIX7-00-001041 - AIX must display the Standard Mandatory DoD Notice and Consent Banner before granting local or remote login access to the system.
AIX7-00-001042 - The Department of Defense (DoD) login banner must be displayed immediately prior to, or as part of, graphical desktop environment login prompts on AIX.
AIX7-00-001043 - The Department of Defense (DoD) login banner must be displayed during SSH, sftp, and scp login sessions on AIX
AIX7-00-001044 - Any publically accessible connection to AIX operating system must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the system.
AIX7-00-001045 - IF LDAP is used, AIX LDAP client must use SSL to authenticate with LDAP server.
AIX7-00-001046 - If LDAP authentication is required, AIX must setup LDAP client to refresh user and group caches less than a day - group cache
AIX7-00-001046 - If LDAP authentication is required, AIX must setup LDAP client to refresh user and group caches less than a day - user cache
AIX7-00-001047 - The AIX /etc/passwd, /etc/security/passwd, and/or /etc/group files must not contain a plus (+) without defining entries for NIS+ netgroups or LDAP netgroups