22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Tightening system default login parameters<br />

The etc/security/login.cfg file should be edited to set up base defaults for many<br />

login parameters, such as those that might be set up for a new user (for example,<br />

number of login retries, login re-enable, and login internal).<br />

Removing unnecessary default user accounts<br />

During installation of the AIX operating system, a number of default user and<br />

group IDs are created. Depending on the applications that are running on the AIX<br />

server and where the AIX server is located in the network, some of these user<br />

and group IDs can become security weaknesses, vulnerable to exploitation. If<br />

these users and group IDs are not needed, they can be removed to minimize the<br />

security risks associated with them.<br />

Table 9-3 lists the most common default user IDs that you might want to remove.<br />

Table 9-3 Potentially removable default user IDs<br />

User ID Description<br />

uucp, nuucp Owner of hidden files used by uucp protocol<br />

lpd Owner of files used by printing subsystem<br />

imnadm IMN search engine (used by Documentation Library Search)<br />

guest Allows access to users who do not have access to accounts<br />

Similarly, Table 9-4 lists common group IDs that might not be needed.<br />

Table 9-4 Potentially removable common group IDs<br />

Group ID Description<br />

uucp Group to which uucp and nuucp users belong<br />

printq Group to which lpd user belongs<br />

imnadm Group to which imnadm user belongs<br />

There might be additional user and group IDs that are not be needed; analyze<br />

the system to identify other IDs that can be removed. Before the system goes<br />

into production, perform a thorough evaluation of available IDs.<br />

9.5.3 Defining access to the trusted communication path<br />

The Trusted Computing Base (TCB) is the part of the system that is responsible<br />

for enforcing system-wide information security policies. By installing and using<br />

Chapter 9. Server hardening 405

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!