Skip to content

Canonical Ubuntu 22.04 LTS Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-OS-000480-GPOS-00227

    Group
  • Ubuntu 22.04 LTS must disable the x86 Ctrl-Alt-Delete key sequence.

    A locally logged-on user who presses Ctrl-Alt-Delete, when at the console, can reboot the system. If accidentally pressed, as could happen in the case of a mixed OS environment, this can create the...
    Rule High Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • SRG-OS-000254-GPOS-00095

    Group
  • Ubuntu 22.04 LTS must initiate session audits at system startup.

    If auditing is enabled late in the startup process, the actions of some startup processes may not be audited. Some audit systems also maintain state information only available if auditing is enable...
    Rule Medium Severity
  • SRG-OS-000138-GPOS-00069

    Group
  • Ubuntu 22.04 LTS must restrict access to the kernel message buffer.

    Restricting access to the kernel message buffer limits access only to root. This prevents attackers from gaining additional system information as a nonprivileged user.
    Rule Low Severity
  • SRG-OS-000184-GPOS-00078

    Group
  • Ubuntu 22.04 LTS must disable kernel core dumps so that it can fail to a secure state if system initialization fails, shutdown fails or aborts fail.

    Kernel core dumps may contain the full contents of system memory at the time of the crash. Kernel core dumps may consume a considerable amount of disk space and may result in denial of service by e...
    Rule Medium Severity
  • SRG-OS-000433-GPOS-00193

    Group
  • SRG-OS-000433-GPOS-00192

    Group
  • SRG-OS-000366-GPOS-00153

    Group
  • SRG-OS-000437-GPOS-00194

    Group
  • Ubuntu 22.04 LTS must be configured so that the Advance Package Tool (APT) removes all software components after updated versions have been installed.

    Previous versions of software components that are not removed from the information system after updates have been installed may be exploited by adversaries. Some information technology products may...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00225

    Group
  • Ubuntu 22.04 LTS must have the "libpam-pwquality" package installed.

    Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resistin...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • SRG-OS-000480-GPOS-00227

    Group
  • SRG-OS-000480-GPOS-00227

    Group
  • SRG-OS-000095-GPOS-00049

    Group
  • SRG-OS-000074-GPOS-00042

    Group
  • SRG-OS-000185-GPOS-00079

    Group
  • SRG-OS-000258-GPOS-00099

    Group
  • Ubuntu 22.04 LTS must have directories that contain system commands set to a mode of "755" or less permissive.

    Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tools is necessary to prevent unauthorized operatio...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    Group
  • SRG-OS-000259-GPOS-00100

    Group
  • Ubuntu 22.04 LTS library files must have mode "755" or less permissive.

    If the operating system were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that are part ...
    Rule Medium Severity
  • SRG-OS-000206-GPOS-00084

    Group
  • SRG-OS-000205-GPOS-00083

    Group
  • SRG-OS-000205-GPOS-00083

    Group
  • Ubuntu 22.04 LTS must generate system journal entries without revealing information that could be exploited by adversaries.

    Any operating system providing too much information in error messages risks compromising the data and security of the structure, and content of error messages needs to be carefully considered by th...
    Rule Medium Severity
  • SRG-OS-000206-GPOS-00084

    Group
  • SRG-OS-000256-GPOS-00097

    Group
  • Ubuntu 22.04 LTS must configure audit tools with a mode of "755" or less permissive.

    Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tools is necessary to prevent unauthorized operatio...
    Rule Medium Severity
  • SRG-OS-000258-GPOS-00099

    Group
  • Ubuntu 22.04 LTS must have directories that contain system commands owned by "root".

    Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tools is necessary to prevent unauthorized operatio...
    Rule Medium Severity
  • SRG-OS-000258-GPOS-00099

    Group
  • SRG-OS-000259-GPOS-00100

    Group
  • Ubuntu 22.04 LTS must have system commands owned by "root" or a system account.

    If Ubuntu 22.04 LTS were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that are part of a...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    Group
  • SRG-OS-000259-GPOS-00100

    Group
  • SRG-OS-000259-GPOS-00100

    Group
  • SRG-OS-000259-GPOS-00100

    Group
  • SRG-OS-000259-GPOS-00100

    Group
  • SRG-OS-000206-GPOS-00084

    Group
  • SRG-OS-000206-GPOS-00084

    Group
  • SRG-OS-000206-GPOS-00084

    Group
  • Ubuntu 22.04 LTS must configure the files used by the system journal to be owned by "root".

    Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational state or can identify the operating system or pla...
    Rule Medium Severity
  • SRG-OS-000206-GPOS-00084

    Group
  • Ubuntu 22.04 LTS must configure the files used by the system journal to be group-owned by "systemd-journal".

    Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational state or can identify the operating system or pla...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules