UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The Group Identifiers (GIDs) reserved for AIX system accounts must not be assigned to non-system accounts as their primary group GID.


Overview

Finding ID Version Rule ID IA Controls Severity
V-91623 AIX7-00-001035 SV-101721r1_rule Medium
Description
Reserved GIDs are typically used by system software packages. If non-system groups have GIDs in this range, they may conflict with system software, possibly leading to the group having permissions to modify system files.
STIG Date
IBM AIX 7.x Security Technical Implementation Guide 2019-04-29

Details

Check Text ( C-90777r3_chk )
From the command prompt, run the following command:

# more /etc/passwd
root:!:0:0::/root:/usr/bin/ksh
daemon:!:1:1::/etc:
bin:!:2:2::/bin:
sys:!:3:3::/usr/sys:
adm:!:4:4::/var/adm:
nobody:!:4294967294:4294967294::/:
invscout:*:6:12::/var/adm/invscout:/usr/bin/ksh
srvproxy:*:203:0:Service Proxy Daemon:/home/srvproxy:/usr/bin/ksh
esaadmin:*:7:0::/var/esa:/usr/bin/ksh
sshd:*:212:203::/var/empty:/usr/bin/ksh
doejohn:*:704:1776::/home/doej:/usr/bin/ksh

Confirm all accounts with a primary GID of 99 and below are used by a system account.

If a GID reserved for system accounts, 0 - 99, is used by a non-system account, this is a finding.
Fix Text (F-97821r1_fix)
Change the primary GID for non-system accounts that have reserved GIDs as their primary GIDs using the following command:
# chuser pgrp=