STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 1 hour ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to IBM AIX 7.x Security Technical Implementation Guide

V-215432

CAT II (Medium)

There must be no .rhosts, .shosts, hosts.equiv, or shosts.equiv files on the AIX system.

Rule ID

SV-215432r991591_rule

STIG

IBM AIX 7.x Security Technical Implementation Guide

Version

V3R2

CCIs

CCI-000366

Discussion

Trust files are convenient, but when used in conjunction with the remote login services, they can allow unauthenticated access to a system.

Check Content

Check for the existence of the files using: 
# find / -name .rhosts 
# find / -name .shosts 
# find / -name hosts.equiv 
# find / -name shosts.equiv 

If ".rhosts", ".shosts", "hosts.equiv", or "shosts.equiv" are found, this is a finding.

Fix Text

Remove the ".rhosts", ".shosts", "hosts.equiv", and/or "shosts.equiv" files.