Canonical Ubuntu 18.04 LTS Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
The Ubuntu operating system must enforce 24 hours/1 day as the minimum password lifetime. Passwords for new users must have a 24 hours/1 day minimum password lifetime restriction.
Enforcing a minimum password lifetime helps to prevent repeated password changes to defeat the password reuse or history enforcement requirement. If users are allowed to immediately and continually...Rule Low Severity -
SRG-OS-000076-GPOS-00044
Group -
SRG-OS-000077-GPOS-00045
Group -
The Ubuntu operating system must prohibit password reuse for a minimum of five generations.
Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. If the information system or application allows the user...Rule Low Severity -
SRG-OS-000078-GPOS-00046
Group -
The Ubuntu operating system must enforce a minimum 15-character password length.
The shorter the password, the lower the number of possible combinations that need to be tested before the password is compromised. Password complexity, or strength, is a measure of the effectivene...Rule Medium Severity -
SRG-OS-000120-GPOS-00061
Group -
The Ubuntu operating system must employ a FIPS 140-2 approved cryptographic hashing algorithms for all created and stored passwords.
The Ubuntu operating system must use a FIPS-compliant hashing algorithm to securely store the password. The FIPS-compliant hashing algorithm parameters must be selected in order to harden the syste...Rule Medium Severity -
SRG-OS-000380-GPOS-00165
Group -
The Ubuntu operating system must allow the use of a temporary password for system logons with an immediate change to a permanent password.
Without providing this capability, an account may be created without a password. Non-repudiation cannot be guaranteed once an account is created if a user is not forced to change the temporary pass...Rule Medium Severity -
SRG-OS-000480-GPOS-00225
Group -
The Ubuntu operating system must prevent the use of dictionary words for passwords.
If the Ubuntu operating system allows the user to select passwords based on dictionary words, then this increases the chances of password compromise by increasing the opportunity for successful gue...Rule Medium Severity -
SRG-OS-000373-GPOS-00156
Group -
SRG-OS-000480-GPOS-00225
Group -
SRG-OS-000138-GPOS-00069
Group -
The Ubuntu operating system must set a sticky bit on all public directories to prevent unauthorized and unintended information transferred via shared system resources.
Preventing unauthorized information transfers mitigates the risk of information, including encrypted representations of information, produced by the actions of prior users/roles (or the actions of ...Rule Medium Severity -
SRG-OS-000205-GPOS-00083
Group -
The Ubuntu operating system must generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.
Any operating system providing too much information in error messages risks compromising the data and security of the structure, and content of error messages needs to be carefully considered by th...Rule Medium Severity -
SRG-OS-000206-GPOS-00084
Group -
The Ubuntu operating system must configure the /var/log directory to be group-owned by syslog.
Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational state or can identify the operating system or pla...Rule Medium Severity -
SRG-OS-000206-GPOS-00084
Group -
SRG-OS-000206-GPOS-00084
Group -
The Ubuntu operating system must configure the /var/log directory to have mode 0755 or less permissive.
Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational state or can identify the operating system or pla...Rule Medium Severity -
SRG-OS-000206-GPOS-00084
Group -
The Ubuntu operating system must configure the /var/log/syslog file to be group-owned by adm.
Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational state or can identify the operating system or pla...Rule Medium Severity -
SRG-OS-000206-GPOS-00084
Group -
The Ubuntu operating system must configure /var/log/syslog file to be owned by syslog.
Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational state or can identify the operating system or pla...Rule Medium Severity -
SRG-OS-000206-GPOS-00084
Group -
SRG-OS-000256-GPOS-00097
Group -
SRG-OS-000256-GPOS-00097
Group -
The Ubuntu operating system must configure audit tools to be owned by root.
Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tools is necessary to prevent unauthorized operatio...Rule Medium Severity -
SRG-OS-000256-GPOS-00097
Group -
The Ubuntu operating system must configure the audit tools to be group-owned by root.
Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tools is necessary to prevent unauthorized operatio...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
Group -
The Ubuntu operating system library files must have mode 0755 or less permissive.
If the operating system were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that are part ...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
Group -
The Ubuntu operating system library directories must have mode 0755 or less permissive.
If the Ubuntu operating system were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that ar...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
Group -
SRG-OS-000259-GPOS-00100
Group -
The Ubuntu operating system library directories must be owned by root.
If the Ubuntu operating system were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that ar...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
Group -
The Ubuntu operating system library files must be group-owned by root.
If the Ubuntu operating system were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that ar...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
Group -
The Ubuntu operating system library directories must be group-owned by root.
If the Ubuntu operating system were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that ar...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
Group -
The Ubuntu operating system must have system commands set to a mode of 0755 or less permissive.
If the Ubuntu operating system were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that ar...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
Group -
SRG-OS-000259-GPOS-00100
Group -
The Ubuntu operating system must have system commands owned by root.
If the Ubuntu operating system were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that ar...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.