STIGQter STIGQter: STIG Summary: IBM AIX 7.x Security Technical Implementation Guide Version: 2 Release: 2 Benchmark Date: 23 Apr 2021:

UIDs reserved for system accounts must not be assigned to non-system accounts on AIX systems.

DISA Rule

SV-215195r508663_rule

Vulnerability Number

V-215195

Group Title

SRG-OS-000480-GPOS-00227

Rule Version

AIX7-00-001036

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Using the "usermod" command, change the UID numbers for non-system accounts with reserved UIDs (those less or equal to 128):
# usermod -u <uid> [user_name]

Check Contents

Check the UID assignments of all accounts using:

# more /etc/passwd
root:!:0:0::/root:/usr/bin/ksh
daemon:!:1:1::/etc:
bin:!:2:2::/bin:
sys:!:3:3::/usr/sys:
adm:!:4:4::/var/adm:
nobody:!:4294967294:4294967294::/:
invscout:*:6:12::/var/adm/invscout:/usr/bin/ksh
srvproxy:*:203:0:Service Proxy Daemon:/home/srvproxy:/usr/bin/ksh
esaadmin:*:7:0::/var/esa:/usr/bin/ksh
sshd:*:212:203::/var/empty:/usr/bin/ksh
doej:*:704:1776::/home/doej:/usr/bin/ksh

Confirm all accounts with a UID of 128 and below are used by a system account.

If a UID reserved for system accounts (0-128) is used by a non-system account, this is a finding.

Vulnerability Number

V-215195

Documentable

False

Rule Version

AIX7-00-001036

Severity Override Guidance

Check the UID assignments of all accounts using:

# more /etc/passwd
root:!:0:0::/root:/usr/bin/ksh
daemon:!:1:1::/etc:
bin:!:2:2::/bin:
sys:!:3:3::/usr/sys:
adm:!:4:4::/var/adm:
nobody:!:4294967294:4294967294::/:
invscout:*:6:12::/var/adm/invscout:/usr/bin/ksh
srvproxy:*:203:0:Service Proxy Daemon:/home/srvproxy:/usr/bin/ksh
esaadmin:*:7:0::/var/esa:/usr/bin/ksh
sshd:*:212:203::/var/empty:/usr/bin/ksh
doej:*:704:1776::/home/doej:/usr/bin/ksh

Confirm all accounts with a UID of 128 and below are used by a system account.

If a UID reserved for system accounts (0-128) is used by a non-system account, this is a finding.

Check Content Reference

M

Target Key

4012

Comments