Item Search

NameAudit NamePluginCategory
GEN001363 - The /etc/resolv.conf file must be group-owned by bin, sys, or system.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN001367 - The /etc/hosts file must be group-owned by bin, sys, or system.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN001369 - The /etc/hosts file must not have an extended ACL.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN001372 - The /etc/nsswitch.conf file must be group-owned by root, bin, sys, or system - Not ApplicableDISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN001420 - The /etc/security/passwd file must have mode 0400.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN001520 - All interactive users' home directories must be group-owned by the home directory owner's primary group.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN001590 - All run control scripts must have no extended ACLs - '/etc/rc*'DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN001600 - Run control scripts' executable search paths must contain only absolute paths.DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN001720 - All global initialization files must have mode 0644 or less permissive - '/etc/csh.login'DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN001740 - All global initialization files must be owned by root - '/etc/environment'DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN001760 - All global initialization files must be group-owned by sys, bin, system, or security - '/etc/csh.cshrc'DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN001820 - All skeleton files and directories (typically in /etc/skel) must be owned by root or bin - '/etc/security/mkuser.sys'DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN001840 - All global initialization files' executable search paths must contain only absolute paths - '/etc/profile'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN001870 - Local initialization files must be group-owned by the user's primary group or root - '~/.bash_profile'DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN001870 - Local initialization files must be group-owned by the user's primary group or root - '~/.bashrc'DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN001870 - Local initialization files must be group-owned by the user's primary group or root - '~/.cshrc'DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN001880 - All local initialization files must have mode 0740 or less permissive - '~/.dispatch'DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN001880 - All local initialization files must have mode 0740 or less permissive - '~/.exrc'DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN001901 - Local initialization files' library search paths must contain only absolute paths - 'LIBPATH'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN001980 - /etc/security/passwd file must not contain a plus (+) without defining entries for NIS+ netgroups - '/etc/security/passwd'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN001980 - The .shosts file must not contain a plus (+) without defining entries for NIS+ netgroups - '~/.shosts'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN001980 - The hosts.equiv file must not contain a plus (+) without defining entries for NIS+ netgroups - '~/hosts.equiv'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN002120 - The /etc/shells (or equivalent) file must exist - '/etc/security/login.cfg contains shells='DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN002300 - Device files used for backup must only be readable and/or writable by root or the backup user - '/dev/cd*'DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN002300 - Device files used for backup must only be readable and/or writable by root or the backup user - '/dev/rmt*'DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN002440 - The owner, group, mode, ACL, and location of files with the setgid bit set must be documented using site-defined proceduresDISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN002560 - The system and user default umask must be 077 - '/etc/*'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN002800 - System must be configured to audit login, logout, and session initiation - '/etc/security/audit/config USER_Logout exists'DISA STIG AIX 5.3 v1r2Unix

AUDIT AND ACCOUNTABILITY

GEN002800 - System must be configured to audit login, logout, and session initiation - '/etc/security/audit/events USER_SU exists'DISA STIG AIX 5.3 v1r2Unix

AUDIT AND ACCOUNTABILITY

GEN002825 - System must be configured to audit load/unload dynamic kernel modules - '/etc/security/audit/events FILE_Mknod exists'DISA STIG AIX 5.3 v1r2Unix

AUDIT AND ACCOUNTABILITY

GEN002860 - Audit logs must be rotated daily.DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN002980 - The cron.allow file must have mode 0640 or less permissive.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN003060 - Default system accounts must be included in the cron.allow file - 'lpd'DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN003060 - Default system accounts must be included in the cron.allow file - 'nobody'DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN003060 - Default system accounts must be included in the cron.allow file - 'sshd'DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN003060 - Default system accounts must GEN003580be included in the cron.deny file - 'sshd'DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN003110 - Cron and crontab directories must not have extended ACLs - '/var/spool/cron' - no acls enabledDISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN003140 - Cron and crontab directories must be group-owned by system, sys, bin, or cron.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN003180 - The cronlog file must have mode 0600 or less permissive.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN003240 - The cron.allow file must be owned by root, bin, or sys.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN003245 - The at.allow file must not have an extended ACL.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN003320 - System accounts must not be listed in at.allow or must be included in at.deny - 'bin' - at.allowDISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN003320 - System accounts must not be listed in at.allow or must be included in at.deny - 'bin' - at.denyDISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN003320 - System accounts must not be listed in at.allow or must be included in at.deny - 'invscout' - at.denyDISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN003320 - System accounts must not be listed in at.allow or must be included in at.deny - 'lpd' - at.denyDISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN003320 - System accounts must not be listed in at.allow or must be included in at.deny - 'snapp' - at.denyDISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN003320 - System accounts must not be listed in at.allow or must be included in at.deny - 'uucp' - at.denyDISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN003360 - The at daemon must not execute group-writable or world-writable programs.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN003510 - Kernel core dumps must be disabled unless needed - 'secondary dump device'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN003600 - The system must not forward IPv4 source-routed packets.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL