GEN001880 - All local initialization files must have mode 0740 or less permissive - '~/.bashrc' | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN001880 - All local initialization files must have mode 0740 or less permissive - '~/.emacs' | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN001880 - All local initialization files must have mode 0755 or less permissive - '~/.dtprofile' | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN001890 - Local initialization files must not have extended ACLs - '.bash_profile' | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN001890 - Local initialization files must not have extended ACLs - '.dispatch' | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN001890 - Local initialization files must not have extended ACLs - '.dtprofile' | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN001890 - Local initialization files must not have extended ACLs - '.profile' | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN001900 - All local initialization files' executable search paths must contain only absolute paths. | DISA STIG AIX 5.3 v1r2 | Unix | CONFIGURATION MANAGEMENT |
GEN001980 - The .rhosts file must not contain a plus (+) without defining entries for NIS+ netgroups - '~/.rhosts' | DISA STIG AIX 5.3 v1r2 | Unix | CONFIGURATION MANAGEMENT |
GEN001980 - The /etc/passwd file must not contain a plus (+) without defining entries for NIS+ netgroups - '/etc/passwd' | DISA STIG AIX 5.3 v1r2 | Unix | CONFIGURATION MANAGEMENT |
GEN002060 - All .rhosts, .shosts, .netrc, or hosts.equiv files must be accessible by only root or the owner - '~/hosts.equiv' - user | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN002060 - All .rhosts, .shosts, .netrc, or hosts.equiv files must be accessible by only root or the owner - '~/shosts.equiv' - permissions | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN002120 - The /etc/shells (or equivalent) file must exist - '/etc/shells file exists' | DISA STIG AIX 5.3 v1r2 | Unix | CONFIGURATION MANAGEMENT |
GEN002140 - All shells referenced in /etc/passwd must be listed in the /etc/shells file, except shells specified for preventing logins | DISA STIG AIX 5.3 v1r2 | Unix | CONFIGURATION MANAGEMENT |
GEN002340 - Audio devices must be owned by root. | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN002380 - The owner, group, mode, ACL, and location of files with the setuid bit set must be documented using site-defined procedures | DISA STIG AIX 5.3 v1r2 | Unix | CONFIGURATION MANAGEMENT |
GEN002640 - Default system accounts must be disabled or removed. | DISA STIG AIX 5.3 v1r2 | Unix | IDENTIFICATION AND AUTHENTICATION |
GEN002660 - Auditing must be implemented. | DISA STIG AIX 5.3 v1r2 | Unix | AUDIT AND ACCOUNTABILITY |
GEN002680 - System audit logs must be owned by root. | DISA STIG AIX 5.3 v1r2 | Unix | AUDIT AND ACCOUNTABILITY |
GEN002690 - System audit logs must be group-owned by bin, sys, or system. | DISA STIG AIX 5.3 v1r2 | Unix | AUDIT AND ACCOUNTABILITY |
GEN002720 - System must be configured to audit failed attempts to access files/programs - '/etc/security/audit/config FILE_Open exists' | DISA STIG AIX 5.3 v1r2 | Unix | AUDIT AND ACCOUNTABILITY |
GEN002720 - System must be configured to audit failed attempts to access files/programs - 'User audit class assignments should be reviewed' | DISA STIG AIX 5.3 v1r2 | Unix | AUDIT AND ACCOUNTABILITY |
GEN002740 - The audit system must be configured to audit file deletions - '/etc/security/audit/events FS_Rmdir exists' | DISA STIG AIX 5.3 v1r2 | Unix | AUDIT AND ACCOUNTABILITY |
GEN002800 - System must be configured to audit login, logout, and session initiation - '/etc/security/audit/config INIT_Start exists' | DISA STIG AIX 5.3 v1r2 | Unix | AUDIT AND ACCOUNTABILITY |
GEN002800 - System must be configured to audit login, logout, and session initiation - '/etc/security/audit/config USER_SU exists' | DISA STIG AIX 5.3 v1r2 | Unix | AUDIT AND ACCOUNTABILITY |
GEN002800 - System must be configured to audit login, logout, and session initiation - '/etc/security/audit/events INIT_End exists' | DISA STIG AIX 5.3 v1r2 | Unix | AUDIT AND ACCOUNTABILITY |
GEN002825 - System must be configured to audit load/unload dynamic kernel modules - '/etc/security/audit/config DEV_Remove exists' | DISA STIG AIX 5.3 v1r2 | Unix | AUDIT AND ACCOUNTABILITY |
GEN002825 - System must be configured to audit load/unload dynamic kernel modules - '/etc/security/audit/events DEV_Configure exists' | DISA STIG AIX 5.3 v1r2 | Unix | AUDIT AND ACCOUNTABILITY |
GEN002960 - Access to the cron utility must be controlled using the cron.allow and/or cron.deny file(s) - '/var/adm/cron/cron.deny' | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN003000 - Cron must not execute group-writable or world-writable programs. | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN003040 - Crontabs must be owned by root or the crontab creator. | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN003060 - Default system accounts must be included in the cron.allow file - 'adm' | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN003060 - Default system accounts must be included in the cron.allow file - 'esaadmin' | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN003060 - Default system accounts must be included in the cron.allow file - 'guest' | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN003060 - Default system accounts must be included in the cron.allow file - 'sys' | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN003060 - Default system accounts must be included in the cron.deny file - 'invscout' | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN003060 - Default system accounts must be included in the cron.deny file - 'pconsole' | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN003190 - The cron log files must not have extended ACLs. | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN003200 - The cron.deny file must have mode 0640 or less permissive. | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN003250 - The cron.allow file must be group-owned by system, bin, sys, or cron. | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN003255 - The at.deny file must not have an extended ACL. | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN003260 - The cron.deny file must be owned by root, bin, or sys. | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN003270 - The cron.deny file must be group-owned by system, bin, sys, or cron. | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN003320 - System accounts must not be listed in at.allow or must be included in at.deny - 'daemon' - at.allow | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN003320 - System accounts must not be listed in at.allow or must be included in at.deny - 'nobody' - at.allow | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN003320 - System accounts must not be listed in at.allow or must be included in at.deny - 'nobody' - at.deny | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN003320 - System accounts must not be listed in at.allow or must be included in at.deny - 'nuucp' - at.deny | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN003320 - System accounts must not be listed in at.allow or must be included in at.deny - 'pconsole' - at.allow | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN003320 - System accounts must not be listed in at.allow or must be included in at.deny - 'snapp' - at.allow | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN003400 - The at directory must have mode 0755 or less permissive. | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |