This is not the current revision of this Checklist, view the current revision.
| Target | CPE Name |
|---|---|
| IBM AIX 5.3 | cpe:/o:ibm:aix:5.3 (View CVEs) |
The AIX Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems.
Not provided.
Not provided.
Not provided.
Not provided.
Not provided.
Not provided.
Comments or proposed revisions to this document should be sent via email to the following address: disa.letterkenny.FSO.mbx.stig-customer-support-mailbox@mail.mil
Comments or proposed revisions to this document should be sent via email to the following address: disa.letterkenny.FSO.mbx.stig-customer-support-mailbox@mail.mil
Not provided.
Not provided.
Version 1, Release 1 - 23 August 2012
| URL | Description |
|---|
| Reference URL | Description |
|---|