UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

On AIX, the SSH server must not permit root logins using remote access programs.


Overview

Finding ID Version Rule ID IA Controls Severity
V-215287 AIX7-00-002102 SV-215287r508663_rule Medium
Description
Permitting direct root login reduces auditable information about who ran privileged commands on the system and also allows direct attack attempts on root's password.
STIG Date
IBM AIX 7.x Security Technical Implementation Guide 2023-05-17

Details

Check Text ( C-16485r294312_chk )
Determine if the SSH daemon is configured to disable root logins:
# grep -iE "PermitRootLogin[[:blank:]]*no" /etc/ssh/sshd_config | grep -v \#

If the above command displays a line, the root login is disabled.

If the root login is not disabled, this is a finding.
Fix Text (F-16483r294313_fix)
Edit the "/etc/ssh/sshd_config" file to have the following line and save the change:
PermitRootLogin no

Restart SSH daemon:
# stopsrc -s sshd
# startsrc -s sshd