This audit has been deprecated and will be removed in a future update.
View Next Audit Versionhttps://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_IBM_AIX_7-x_V2R3_STIG.zip
Audit Name: DISA STIG AIX 7.x v2r3
Category: ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT, MAINTENANCE
References: 800-53|AC-2(4), 800-53|AC-6(9), 800-53|AU-6(4), 800-53|AU-12, 800-53|CM-5(1), 800-53|MA-4(1), CAT|II, CCI|CCI-000018, CCI|CCI-000154, CCI|CCI-000169, CCI|CCI-000172, CCI|CCI-001403, CCI|CCI-001404, CCI|CCI-001405, CCI|CCI-001686, CCI|CCI-001813, CCI|CCI-002130, CCI|CCI-002132, CCI|CCI-002234, CCI|CCI-002884, Rule-ID|SV-215246r508663_rule, STIG-ID|AIX7-00-002016, STIG-Legacy|SV-101873, STIG-Legacy|V-91775, Vuln-ID|V-215246
Plugin: Unix
Control ID: f1a8958cb70c5b0319c652d7cad15efbcfb35175f99625bcdd93b9c54a3d3705