AIX Version 7.2: Security Security
Total Page:16
File Type:pdf, Size:1020Kb
AIX Version 7.2 Security IBM Note Before using this information and the product it supports, read the information in “Notices” on page 497. This edition applies to AIX Version 7.2 and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright International Business Machines Corporation 2015, 2020. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents About this document..............................................................................................v Highlighting...................................................................................................................................................v Case-sensitivity in AIX................................................................................................................................. v ISO 9000.......................................................................................................................................................v Security................................................................................................................ 1 What's new...................................................................................................................................................1 Securing the base operating system........................................................................................................... 1 Secure system installation and configuration........................................................................................2 Users, groups, and passwords............................................................................................................. 46 Role-based access control...................................................................................................................79 Access Control Lists........................................................................................................................... 117 Auditing overview...............................................................................................................................129 Lightweight Directory Access Protocol..............................................................................................150 EFS Encrypted File System................................................................................................................ 171 Public Key Cryptography Standards #11.......................................................................................... 177 Pluggable Authentication Modules....................................................................................................192 OpenSSH and Kerberos Version 5 support........................................................................................200 Encrypted logical volumes.................................................................................................................203 Securing the network...............................................................................................................................204 TCP/IP security...................................................................................................................................204 Network services................................................................................................................................212 Internet Protocol security..................................................................................................................217 Network File System security............................................................................................................ 278 Enterprise identity mapping.............................................................................................................. 285 Kerberos............................................................................................................................................. 286 Remote authentication dial-in user service server........................................................................... 314 AIX Intrusion prevention................................................................................................................... 344 AIX Security Expert..................................................................................................................................347 AIX Security Expert security hardening.............................................................................................347 Secure by default............................................................................................................................... 348 Distributing security policy through LDAP.........................................................................................349 Customizable security policy with user-defined AIX Security Expert XML rules............................. 350 Stringent check for weak passwords.................................................................................................351 COBIT control objectives supported by AIX Security Expert............................................................351 Applying COBIT control objectives using AIX Security Expert......................................................... 354 SOX-COBIT compliance checking, audit, and pre-audit feature ..................................................... 354 AIX Security Expert Password Policy Rules group............................................................................354 AIX Security Expert User Group System and Password definitions group.......................................357 AIX Security Expert Login Policy Recommendations group............................................................. 358 AIX Security Expert Audit Policy Recommendations group............................................................. 360 AIX Security Expert /etc/inittab Entries group..................................................................................363 AIX Security Expert /etc/rc.tcpip Settings group.............................................................................. 364 AIX Security Expert /etc/inetd.conf Settings group..........................................................................368 AIX Security Expert Disable SUID of Commands group................................................................... 377 AIX Security Expert Disable Remote Services group........................................................................378 AIX Security Expert Remove access that does not require Authentication group...........................379 AIX Security Expert Tuning Network Options group......................................................................... 380 AIX Security Expert IPsec filter rules group......................................................................................385 AIX Security Expert Miscellaneous group......................................................................................... 386 iii AIX Security Expert Undo Security.................................................................................................... 390 AIX Security Expert Check Security...................................................................................................390 AIX Security Expert files.................................................................................................................... 390 AIX Security Expert High level security scenario.............................................................................. 391 AIX Security Expert Medium level security scenario........................................................................ 392 AIX Security Expert Low level security scenario...............................................................................392 Security checklist.....................................................................................................................................392 Summary of common AIX system services............................................................................................ 393 Summary of network service options..................................................................................................... 407 Trusted AIX.............................................................................................................................................. 409 Introduction to Trusted AIX...............................................................................................................410 Multi-level security.............................................................................................................................412 Trusted AIX administration................................................................................................................424 Trusted AIX programming..................................................................................................................453 Troubleshooting Trusted AIX.............................................................................................................493 File security flags............................................................................................................................... 495 Trusted AIX commands..................................................................................................................... 495 Notices..............................................................................................................497