CIS IBM AIX 7.2 Benchmark 1.1.0 Checklist Details (Checklist Revisions)
Supporting Resources:
-
Download Prose - CIS IBM AIX 7.2 Benchmark v1.1.0
- Center for Internet Security (CIS)
Target:
Target | CPE Name |
---|---|
IBM AIX 7.2 | cpe:/o:ibm:aix:7.2 (View CVEs) |
Checklist Highlights
- Checklist Name:
- CIS IBM AIX 7.2 Benchmark
- Checklist ID:
- 1142
- Version:
- 1.1.0
- Type:
- Compliance
- Review Status:
- Final
- Authority:
- Third Party: Center for Internet Security (CIS)
- Original Publication Date:
- 09/30/2023
Checklist Summary:
This document, Security Configuration Benchmark for AIX 7.2, provides prescriptive guidance for establishing a secure configuration posture for AIX version 7.2 running on the Power Systems platform. Local site security policy and system purpose should be taken into account. This guide was tested against AIX 7.2 installed from IBM base installation media. This will be the terminal release of the AIX 7.2 Benchmark. Future support for AIX 7.2 will be provided by the AIX 7 Benchmark which will cover all supported versions of AIX 7.x The account aka user executing this benchmark requires root (direct login, su, sudo or RBAC) access to system privileges are required by many of the operations presented here. Non-root access may not be able to access certain areas of the system during and/or after remediation. Further, we advise that prior to execution the commands and scripts included in this benchmark as well as the PATH of the (root) user are verified. To obtain the latest version of this guide, please visit https://learn.cisecurity.org/benchmarks. If you have questions, comments, or have identified ways to improve this guide, please write us at feedback@cisecurity.org.
Checklist Role:
- Server Operating System
Known Issues:
Not provided.
Target Audience:
This document is intended for system and application administrators, security specialists, auditors, help desk, and platform deployment personnel, who plan to develop, deploy, assess, or secure solutions that incorporate AIX 7.2 on the Power Systems platform. Some skill with AIX system administration tools is expected. Most recommendations Audit and Remediation steps have been written using AIX system administration tools. Skilled use of AIX smit is recommended. Besides providing ${HOME}/smit.log as a record of steps taken the file ${HOME}/smit.scripts and/or F6 panel can help with implementing complex remediation and/or audit scripts that can be executed directly. Skilled use of vi (or other editor already installed) is needed in order to implement some of the configuration changes (when we have not yet found a SMIT based command dialog or consider it more prudent to create a script using hints from SMIT and/or it is not part of AIX system administration tools. In general we always try to use an AIX command rather than a text based editor (e.g., vi) - as a best practice policy. One example is using the AIX command chsec to modify files in the directory /etc/security rather than using a text editor.
Target Operational Environment:
- Managed
- Specialized Security-Limited Functionality (SSLF)
Testing Information:
Not provided.
Regulatory Compliance:
Not provided.
Comments/Warnings/Miscellaneous:
Not provided.
Disclaimer:
Not provided.
Product Support:
Not provided.
Point of Contact:
feedback@cisecurity.org
Sponsor:
Not provided.
Licensing:
Not provided.
Change History:
new checklist - 2/28/24 updated status to FINAL - 3/28/24
Dependency/Requirements:
URL | Description |
---|
References:
Reference URL | Description |
---|