STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 1 hour ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to IBM AIX 7.x Security Technical Implementation Guide

V-215231

CAT II (Medium)

If SNMP service is enabled on AIX, the default SNMP password must not be used in the /etc/snmpd.conf config file.

Rule ID

SV-215231r991589_rule

STIG

IBM AIX 7.x Security Technical Implementation Guide

Version

V3R2

CCIs

CCI-000366

Discussion

Use default SNMP password increases the chance of security vulnerability on SNMP service.

Check Content

Inspect "/etc/snmpd.conf" to find all the passwords that are used in the config file:

# grep -v "^#" /etc/snmpd.conf | grep -E "public|private|password"

If any results are returned, default passwords are being used and this is a finding.

Fix Text

Edit "/etc/snmpd.conf" config file to remove or change all the default passwords that are used in the file.

Restart snmpd:
# stopsrc -s snmpd
# startsrc -s snmpd