The /etc/security directory contains multiple files and directories used to keep the targeted AIX system secure.Most subsystems are owned by root:security (UID:GID). However, additional systems such as AUDIT and AIXPERT have their own permissions (and recommendations). Traditionally, /etc/security has been identified as USER administration - including the shadow password file. But there is much more under /etc/security. Normal installations also have configuration files for security subsystems including: aixpert tsd ice ldap rbac audit ipsec fpm and trusted computing (tscd) While these subsystems may not be enabled - their configuration files need to be secured to ensure no unauthorized access. The /etc/security directory contains sensitive files for multiple security systems. For the USER subsystem there are files such as /etc/security/passwd /etc/security/user that must be secured from unauthorized access and modification.
Solution
Ensure correct access control settings for security subsystem configuration files installed in /etc/security : #!/usr/bin/ksh -e # security_subsys:4.8.1.5 # Provided to CIS by AIXTools # Copyright AIXTools, 2022 EXCLUDE="security/(aixpert|audit|ice)" find /etc/security -type d | /usr/bin/egrep -v ${EXCLUDE} | /usr/bin/sort | xargs ls -led | /usr/bin/awk '{print $1 " " $3 " " $4 " " $9}' | /usr/bin/grep -v drwxr-s---- | awk '{print $NF}' | while read SECDIR; do find ${SECDIR} | grep -v ${EXCLUDE} | xargs chown root:security find ${SECDIR} -type d | grep -v ${EXCLUDE} | xargs chmod g-w,o-rwx find ${SECDIR} -type f | grep -v ${EXCLUDE} | xargs chmod u-x,g-wx,o-rwx done