STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to IBM AIX 7.x Security Technical Implementation Guide

V-215223

CAT II (Medium)

AIX Operating systems must enforce a 60-day maximum password lifetime restriction.

Rule ID

SV-215223r1038967_rule

STIG

IBM AIX 7.x Security Technical Implementation Guide

Version

V3R2

CCIs

CCI-004066CCI-000199

Discussion

Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed periodically. If the operating system does not limit the lifetime of passwords and force users to change their passwords, there is the risk that the operating system passwords could be compromised.

Check Content

From the command prompt, run the following command to check the system default "maxage" attribute value:
# lssec -f /etc/security/user -s default -a maxage
default maxage=8

If the default "maxage" value is not set, or its value is great than "8", or its value is set to "0", this is a finding.

From the command prompt, run the following command to check "maxage" attribute value for all accounts:
# lsuser -a maxage ALL
root maxage=8
user1 maxage=8
user2 maxage=8

If any user does not have "maxage" set, or its "maxage" value is greater than "8", or its value is set to "0", this is a finding.

Fix Text

From the command prompt, run the following command to set "maxage=8" (56 days) for the default stanza in "/etc/security/user":
# chsec -f /etc/security/user -s default -a maxage=8

For each user who has "maxage" value great than "8", set its "maxage" to "8" by running the following command from command prompt:
# chsec -f /etc/security/user -s [user_name] -a maxage=8