UCF STIG Viewer Logo

The Network Information System (NIS) protocol must not be used.


Overview

Finding ID Version Rule ID IA Controls Severity
V-867 GEN006400 SV-867r7_rule ECSC-1 Medium
Description
Due to numerous security vulnerabilities existing within NIS, it must not be used. Possible alternative directory services are NIS+ and LDAP.
STIG Date
Draft AIX Security Technical Implementation Guide 2011-08-17

Details

Check Text ( C-851r3_chk )
Perform the following to determine if NIS is active on the system:

# ps –ef | grep ypbind

If NIS is found active on the system, this is a finding.
Fix Text (F-1021r3_fix)
Disable the use of NIS. Possible replacements are NIS+ and LDAP.