Canonical Ubuntu 22.04 LTS Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-OS-000109-GPOS-00056
Group -
SRG-OS-000104-GPOS-00051
Group -
SRG-OS-000075-GPOS-00043
Group -
Ubuntu 22.04 LTS must enforce 24 hours/one day as the minimum password lifetime. Passwords for new users must have a 24 hours/one day minimum password lifetime restriction.
Enforcing a minimum password lifetime helps to prevent repeated password changes to defeat the password reuse or history enforcement requirement. If users are allowed to immediately and continually...Rule Medium Severity -
SRG-OS-000076-GPOS-00044
Group -
Ubuntu 22.04 LTS must enforce a 60-day maximum password lifetime restriction. Passwords for new users must have a 60-day maximum password lifetime restriction.
Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed periodically. If the operating system does not limit the lifetime of passwords and force user...Rule Medium Severity -
SRG-OS-000118-GPOS-00060
Group -
Ubuntu 22.04 LTS must disable account identifiers (individuals, groups, roles, and devices) after 35 days of inactivity.
Inactive identifiers pose a risk to systems and applications because attackers may exploit an inactive identifier and potentially obtain undetected access to the system. Owners of inactive accounts...Rule Medium Severity -
SRG-OS-000002-GPOS-00002
Group -
SRG-OS-000021-GPOS-00005
Group -
Ubuntu 22.04 LTS must automatically lock an account until the locked account is released by an administrator when three unsuccessful logon attempts have been made.
By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, is reduced. Limits are imposed by locking the a...Rule Low Severity -
SRG-OS-000480-GPOS-00226
Group -
Ubuntu 22.04 LTS must enforce a delay of at least four seconds between logon prompts following a failed logon attempt.
Limiting the number of logon attempts over a certain time interval reduces the chances that an unauthorized user may gain access to an account.Rule Low Severity -
SRG-OS-000027-GPOS-00008
Group -
Ubuntu 22.04 LTS must limit the number of concurrent sessions to ten for all accounts and/or account types.
Ubuntu 22.04 LTS management includes the ability to control the number of users and user sessions that utilize an operating system. Limiting the number of allowed users and sessions per user is hel...Rule Low Severity -
SRG-OS-000030-GPOS-00011
Group -
SRG-OS-000279-GPOS-00109
Group -
SRG-OS-000480-GPOS-00228
Group -
Ubuntu 22.04 LTS default filesystem permissions must be defined in such a way that all authenticated users can read and modify only their own files.
Setting the most restrictive default permissions ensures newly created accounts do not have unnecessary access.Rule Medium Severity -
SRG-OS-000312-GPOS-00124
Group -
SRG-OS-000368-GPOS-00154
Group -
Ubuntu 22.04 LTS must be configured to use AppArmor.
Control of program execution is a mechanism used to prevent execution of unauthorized programs. Some operating systems may provide a capability that runs counter to the mission or provides users wi...Rule Medium Severity -
SRG-OS-000373-GPOS-00156
Group -
Ubuntu 22.04 LTS must require users to reauthenticate for privilege escalation or when changing roles.
Without reauthentication, users may access resources or perform tasks for which they do not have authorization. When operating systems provide the capability to escalate a functional capabili...Rule Medium Severity -
SRG-OS-000134-GPOS-00068
Group -
SRG-OS-000069-GPOS-00037
Group -
Ubuntu 22.04 LTS must enforce password complexity by requiring at least one uppercase character be used.
Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resistin...Rule Medium Severity -
SRG-OS-000070-GPOS-00038
Group -
SRG-OS-000071-GPOS-00039
Group -
Ubuntu 22.04 LTS must enforce password complexity by requiring that at least one numeric character be used.
Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resistin...Rule Medium Severity -
SRG-OS-000266-GPOS-00101
Group -
Ubuntu 22.04 LTS must enforce password complexity by requiring that at least one special character be used.
Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity or strength is a measure of the effectiveness of a password in resisting ...Rule Medium Severity -
SRG-OS-000480-GPOS-00225
Group -
SRG-OS-000078-GPOS-00046
Group -
SRG-OS-000072-GPOS-00040
Group -
Ubuntu 22.04 LTS must require the change of at least eight characters when passwords are changed.
If the operating system allows the user to consecutively reuse extensive portions of passwords, this increases the chances of password compromise by increasing the window of opportunity for attempt...Rule Medium Severity -
SRG-OS-000480-GPOS-00225
Group -
Ubuntu 22.04 LTS must be configured so that when passwords are changed or new passwords are established, pwquality must be used.
Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resistin...Rule Medium Severity -
SRG-OS-000073-GPOS-00041
Group -
SRG-OS-000480-GPOS-00227
Group -
SRG-OS-000480-GPOS-00227
Group -
Ubuntu 22.04 LTS must not have accounts configured with blank or null passwords.
If an account has an empty password, anyone could log on and run commands with the privileges of that account. Accounts with empty passwords must never be used in operational environments.Rule High Severity -
SRG-OS-000120-GPOS-00061
Group -
Ubuntu 22.04 LTS must encrypt all stored passwords with a FIPS 140-3-approved cryptographic hashing algorithm.
Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are not encrypted, they can be plainly read (i.e., clear text) and easily c...Rule Medium Severity -
SRG-OS-000375-GPOS-00160
Group -
SRG-OS-000376-GPOS-00161
Group -
Ubuntu 22.04 LTS must accept personal identity verification (PIV) credentials.
The use of PIV credentials facilitates standardization and reduces the risk of unauthorized access. DOD has mandated the use of the common access card (CAC) to support identity management and ...Rule Medium Severity -
SRG-OS-000105-GPOS-00052
Group -
SRG-OS-000377-GPOS-00162
Group -
SRG-OS-000066-GPOS-00034
Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.