Information
The /etc/security directory contains multiple files and directories used to keep the targeted AIX system secure.Most subsystems are owned by root:security (UID:GID). However, additional systems such as AUDIT and AIXPERT have their own permissions (and recommendations).
Traditionally, /etc/security has been identified as USER administration - including the shadow password file. But there is much more under /etc/security. Normal installations also have configuration files for security subsystems including: aixpert tsd ice ldap rbac audit ipsec fpm and trusted computing (tscd)
While these subsystems may not be enabled - their configuration files need to be secured to ensure no unauthorized access.
The /etc/security directory contains sensitive files for multiple security systems. For the USER subsystem there are files such as /etc/security/passwd /etc/security/user that must be secured from unauthorized access and modification.
Solution
Ensure correct access control settings for security subsystem configuration files installed in /etc/security :
#!/usr/bin/ksh -e
# Provided to CIS by AIXTools
# Copyright AIXTools, 2022, 2025
EXCLUDE="security/(aixpert|audit|ice)"
find /etc/security -type d | \
/usr/bin/egrep -v ${EXCLUDE} | \
/usr/bin/sort | xargs ls -led | \
/usr/bin/awk '{print $1 " " $3 " " $4 " " $9}' | \
/usr/bin/grep -v drwxr-s---- | \
awk '{print $NF}' | while read SECDIR; do
/usr/bin/find ${SECDIR} | /usr/bin/grep -v ${EXCLUDE} | /usr/bin/xargs chown root:security
/usr/bin/find ${SECDIR} -type d | /usr/bin/grep -v ${EXCLUDE} | /usr/bin/xargs chmod g-w+s,o-rwx
/usr/bin/find ${SECDIR} -type f | /usr/bin/grep -v ${EXCLUDE} | /usr/bin/xargs chmod u-x,g-wx,o-rwx
done