STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 1 hour ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to IBM AIX 7.x Security Technical Implementation Guide

V-215326

CAT II (Medium)

All library files must not have extended ACLs.

Rule ID

SV-215326r991560_rule

STIG

IBM AIX 7.x Security Technical Implementation Guide

Version

V3R2

CCIs

CCI-001499

Discussion

Unauthorized access could destroy the integrity of the library files.

Check Content

The following system library directories need to be checked:
/usr/lib/security/
/usr/lib/methods/

Determine if any system library file has an extended ACL by running the follow script:

find /usr/lib/security /usr/lib/methods/ -type f | while read file
do
aclget -o /tmp/111.acl $file > /dev/null 2>&1
if [ $? -eq 0 ]; then
grep -e "[[:space:]]enabled$" /tmp/111.acl > /dev/null 2>&1
if [ $? -eq 0 ]; then
echo "$file has ACL"
fi
fi
done

If the above script yield any output, this is a finding.

Fix Text

Remove the extended ACL(s) from the system library file(s) and disable extended permissions using the follow script:

find /usr/lib/security /usr/lib/methods/ -type f | while read file
do
aclget -o /tmp/111.acl $file > /dev/null 2>&1
if [ $? -eq 0 ]; then
grep -e "[[:space:]]enabled$" /tmp/111.acl > /dev/null 2>&1
if [ $? -eq 0 ]; then
echo "Removing ACL from "$file
cat /tmp/111.acl | head -n9 > /tmp/222.acl
echo "    disabled" >> /tmp/222.acl
aclput -i /tmp/222.acl $file
fi
fi
done