STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 1 hour ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to IBM AIX 7.x Security Technical Implementation Guide

V-215393

CAT II (Medium)

If Stream Control Transmission Protocol (SCTP) must be disabled on AIX.

Rule ID

SV-215393r958480_rule

STIG

IBM AIX 7.x Security Technical Implementation Guide

Version

V3R2

CCIs

CCI-000382

Discussion

The Stream Control Transmission Protocol (SCTP) is an IETF-standardized transport layer protocol. This protocol is not yet widely used. Binding this protocol to the network stack increases the attack surface of the host. Unprivileged local processes may be able to cause the system to dynamically load a protocol handler by opening a socket using the protocol.

Check Content

Check the system to determine if SCTP is installed: 

# lslpp -L bos.net.sctp
Fileset                      Level  State  Type  Description (Uninstaller)
  ----------------------------------------------------------------------------
lslpp: 0504-132  Fileset bos.net.sctp not installed.

If the "bos.net.sctp" fileset is not listed, SCTP is not installed, this is not a finding. 

If the "bos.net.sctp" fileset is listed then SCTP is installed, this is a finding.

Fix Text

If SCTP is installed, unload it from the kernel and uninstall it from the system using the following commands: 
# sctpctrl unload
# installp -ug bos.net.sctp