UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

AIX Operating systems must enforce a 60-day maximum password lifetime restriction.


Overview

Finding ID Version Rule ID IA Controls Severity
V-91311 AIX7-00-001126 SV-101409r1_rule Medium
Description
Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed periodically. If the operating system does not limit the lifetime of passwords and force users to change their passwords, there is the risk that the operating system passwords could be compromised.
STIG Date
IBM AIX 7.x Security Technical Implementation Guide 2019-04-29

Details

Check Text ( C-90465r1_chk )
From the command prompt, run the following command to check the system default "maxage" attribute value:
# lssec -f /etc/security/user -s default -a maxage
default maxage=8

If the default "maxage" value is not set, or its value is great than "8", or its value is set to "0", this is a finding.

From the command prompt, run the following command to check "maxage" attribute value for all accounts:
# lsuser -a maxage ALL
root maxage=8
user1 maxage=8
user2 maxage=8

If any user does not have "maxage" set, or its "maxage" value is greater than "8", or its value is set to "0", this is a finding.
Fix Text (F-97509r1_fix)
From the command prompt, run the following command to set "maxage=8" (56 days) for the default stanza in "/etc/security/user":
# chsec -f /etc/security/user -s default -a maxage=8

For each user who has "maxage" value great than "8", set its "maxage" to "8" by running the following command from command prompt:
# chsec -f /etc/security/user -s [user_name] -a maxage=8