STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 1 hour ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to IBM AIX 7.x Security Technical Implementation Guide

V-215223

CAT II (Medium)

AIX Operating systems must enforce a 60-day maximum password lifetime restriction.

Rule ID

SV-215223r1038967_rule

STIG

IBM AIX 7.x Security Technical Implementation Guide

Version

V3R2

CCIs

CCI-004066CCI-000199

Discussion

Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed periodically. If the operating system does not limit the lifetime of passwords and force users to change their passwords, there is the risk that the operating system passwords could be compromised.

Check Content

From the command prompt, run the following command to check the system default "maxage" attribute value:
# lssec -f /etc/security/user -s default -a maxage
default maxage=8

If the default "maxage" value is not set, or its value is great than "8", or its value is set to "0", this is a finding.

From the command prompt, run the following command to check "maxage" attribute value for all accounts:
# lsuser -a maxage ALL
root maxage=8
user1 maxage=8
user2 maxage=8

If any user does not have "maxage" set, or its "maxage" value is greater than "8", or its value is set to "0", this is a finding.

Fix Text

From the command prompt, run the following command to set "maxage=8" (56 days) for the default stanza in "/etc/security/user":
# chsec -f /etc/security/user -s default -a maxage=8

For each user who has "maxage" value great than "8", set its "maxage" to "8" by running the following command from command prompt:
# chsec -f /etc/security/user -s [user_name] -a maxage=8