Skip to content

Canonical Ubuntu 18.04 LTS Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • The Ubuntu operating system must have directories that contain system commands owned by root.

    If the Ubuntu operating system were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that ar...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    Group
  • The Ubuntu operating system must have system commands group-owned by root or a system account.

    If the Ubuntu operating system were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that ar...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    Group
  • The Ubuntu operating system must have directories that contain system commands group-owned by root.

    If the Ubuntu operating system were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that ar...
    Rule Medium Severity
  • SRG-OS-000266-GPOS-00101

    Group
  • SRG-OS-000480-GPOS-00227

    Group
  • The Ubuntu Operating system must disable the x86 Ctrl-Alt-Delete key sequence if a graphical user interface is installed.

    A locally logged-on user who presses Ctrl-Alt-Delete, when at the console, can reboot the system. If accidentally pressed, as could happen in the case of a mixed OS environment, this can create the...
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The Ubuntu Operating system must disable the x86 Ctrl-Alt-Delete key sequence.

    A locally logged-on user who presses Ctrl-Alt-Delete, when at the console, can reboot the system. If accidentally pressed, as could happen in the case of a mixed OS environment, this can create the...
    Rule High Severity
  • SRG-OS-000064-GPOS-00033

    Group
  • The Ubuntu operating system must generate audit records for the use and modification of the tallylog file.

    Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...
    Rule Medium Severity
  • SRG-OS-000064-GPOS-00033

    Group
  • The Ubuntu operating system must generate audit records for the use and modification of faillog file.

    Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...
    Rule Medium Severity
  • SRG-OS-000064-GPOS-00033

    Group
  • The Ubuntu operating system must generate audit records for the use and modification of the lastlog file.

    Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...
    Rule Medium Severity
  • SRG-OS-000471-GPOS-00215

    Group
  • The Ubuntu operating system must generate audit records for privileged activities or other system-level access.

    Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...
    Rule Medium Severity
  • SRG-OS-000472-GPOS-00217

    Group
  • The Ubuntu operating system must generate audit records for the /var/log/wtmp file.

    Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...
    Rule Medium Severity
  • SRG-OS-000472-GPOS-00217

    Group
  • The Ubuntu operating system must generate audit records for the /var/run/utmp file.

    Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...
    Rule Medium Severity
  • SRG-OS-000472-GPOS-00217

    Group
  • The Ubuntu operating system must generate audit records for the /var/log/btmp file.

    Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...
    Rule Medium Severity
  • SRG-OS-000476-GPOS-00221

    Group
  • SRG-OS-000476-GPOS-00221

    Group
  • SRG-OS-000476-GPOS-00221

    Group
  • The Ubuntu operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/gshadow.

    Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...
    Rule Medium Severity
  • SRG-OS-000476-GPOS-00221

    Group
  • The Ubuntu operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.

    Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...
    Rule Medium Severity
  • SRG-OS-000476-GPOS-00221

    Group
  • The Ubuntu operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/security/opasswd.

    Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...
    Rule Medium Severity
  • SRG-OS-000038-GPOS-00016

    Group
  • SRG-OS-000046-GPOS-00022

    Group
  • SRG-OS-000047-GPOS-00023

    Group
  • SRG-OS-000058-GPOS-00028

    Group
  • The Ubuntu operating system must be configured so that audit log files cannot be read or write-accessible by unauthorized users.

    If audit information were to become compromised, then forensic analysis and discovery of the true source of potentially malicious system activity is impossible to achieve. To ensure the veracity o...
    Rule Medium Severity
  • SRG-OS-000058-GPOS-00028

    Group
  • The Ubuntu operating system must permit only authorized accounts ownership of the audit log files.

    If audit information were to become compromised, then forensic analysis and discovery of the true source of potentially malicious system activity is impossible to achieve. To ensure the veracity o...
    Rule Medium Severity
  • SRG-OS-000058-GPOS-00028

    Group
  • SRG-OS-000059-GPOS-00029

    Group
  • SRG-OS-000059-GPOS-00029

    Group
  • The Ubuntu operating system must allow only authorized accounts to own the audit log directory.

    If audit information were to become compromised, then forensic analysis and discovery of the true source of potentially malicious system activity is impossible to achieve. To ensure the veracity o...
    Rule Medium Severity
  • SRG-OS-000059-GPOS-00029

    Group
  • SRG-OS-000063-GPOS-00032

    Group
  • The Ubuntu operating system must be configured so that audit configuration files are not write-accessible by unauthorized users.

    Without the capability to restrict which roles and individuals can select which events are audited, unauthorized personnel may be able to prevent the auditing of critical events. Misconfigured audi...
    Rule Medium Severity
  • SRG-OS-000063-GPOS-00032

    Group
  • The Ubuntu operating system must permit only authorized accounts to own the audit configuration files.

    Without the capability to restrict which roles and individuals can select which events are audited, unauthorized personnel may be able to prevent the auditing of critical events. Misconfigured audi...
    Rule Medium Severity
  • SRG-OS-000063-GPOS-00032

    Group
  • SRG-OS-000341-GPOS-00132

    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules