oval:mil.disa.fso.hpux11:def:125

compliance
unix

The Berkeley r-commands are legacy services which allow cleartext remote access and have an insecure trust model and should never be used. The ability to use .rhosts files, which are used to specify a list of hosts that are permitted remote access to a particular account without authenticating, should be disabled.

PlatformSourceComponent
HPUX 11-31STIG
  • HP-UX 11.31 Security Technical Implementation Guide
    • 1. I - Mission Critical Classified
    • 2. I - Mission Critical Public
    • 3. I - Mission Critical Sensitive
    • 4. II - Mission Support Classified
    • 5. II - Mission Support Public
    • 6. II - Mission Support Sensitive
    • 7. III - Administrative Classified
    • 8. III - Administrative Public
    • 9. III - Administrative Sensitive

Cyberisc is a full featured, FREE, compliance and vulnerability scanner that makes it easy to enforce industry standard security configurations across your infrastructure in minutes. Automate your compliance and vulnerability scans and increase your visibility of insecure systems. Harden your infrastructure by patching and configuring your systems with industry standard security configurations. Audit all your systems and meet government & industry regulations.