Information
This /etc/security directory contains multiple files and directories used to keep the targeted AIX system secure. Most subsystems are owned by root:security (UID:GID). However, additional systems such as AUDIT and AIXPERT have there own permissions (and recommendations).
Traditionally, /etc/security has been identified as USER administration - including the shadow password file. But there is much more under /etc/security. Normal installations also have configuration files for security subsystems including: aixpert, tsd, ice, ldap, rbac, audit, ipsec, fpm, and trusted computing (tscd).
While these subsystems may not be enabled - their files need to be secured to ensure no unauthorized access.
Rationale:
The /etc/security directory contains sensitive files for multiple security systems. For the USER subsystem there are files such as /etc/security/passwd, /etc/security/user that must be secured from unauthorized access and modification.
Solution
Ensure correct access control settings for security subsystem configuration directories in /etc/security:
#!/usr/bin/ksh -e
# Provided to CIS by AIXTools
# Copyright AIXTools, 2023
SPECIAL='security/(aixpert|audit|ice)'
find /etc/security -type d -ls |
/usr/bin/awk '{print $NF ' ' $3}' |
/usr/bin/grep -v drwxr-s--- |
while read SECDIR mode; do
chmod u=rwx,g=rxs,o= ${SECDIR}
done
find /etc/security -type d -a ( ! -group security -o ! -user root ) |
/usr/bin/egrep -v ${SPECIAL} | xargs chown root:security
find /etc/security/aixpert /etc/security/ice -type d -a ( ! -group bin -o ! -user bin ) |
xargs chown bin:bin
find /etc/security/audit -type d -a ( ! -group audit -o ! -user root ) |
xargs chown root:audit
Default Value:
N/A