Canonical Ubuntu 18.04 LTS Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
The Ubuntu operating system must have directories that contain system commands owned by root.
If the Ubuntu operating system were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that ar...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
Group -
The Ubuntu operating system must have system commands group-owned by root or a system account.
If the Ubuntu operating system were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that ar...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
Group -
The Ubuntu operating system must have directories that contain system commands group-owned by root.
If the Ubuntu operating system were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that ar...Rule Medium Severity -
SRG-OS-000266-GPOS-00101
Group -
SRG-OS-000480-GPOS-00227
Group -
The Ubuntu Operating system must disable the x86 Ctrl-Alt-Delete key sequence if a graphical user interface is installed.
A locally logged-on user who presses Ctrl-Alt-Delete, when at the console, can reboot the system. If accidentally pressed, as could happen in the case of a mixed OS environment, this can create the...Rule High Severity -
SRG-OS-000480-GPOS-00227
Group -
The Ubuntu Operating system must disable the x86 Ctrl-Alt-Delete key sequence.
A locally logged-on user who presses Ctrl-Alt-Delete, when at the console, can reboot the system. If accidentally pressed, as could happen in the case of a mixed OS environment, this can create the...Rule High Severity -
SRG-OS-000064-GPOS-00033
Group -
The Ubuntu operating system must generate audit records for the use and modification of the tallylog file.
Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...Rule Medium Severity -
SRG-OS-000064-GPOS-00033
Group -
The Ubuntu operating system must generate audit records for the use and modification of faillog file.
Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...Rule Medium Severity -
SRG-OS-000064-GPOS-00033
Group -
The Ubuntu operating system must generate audit records for the use and modification of the lastlog file.
Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...Rule Medium Severity -
SRG-OS-000471-GPOS-00215
Group -
The Ubuntu operating system must generate audit records for privileged activities or other system-level access.
Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...Rule Medium Severity -
SRG-OS-000472-GPOS-00217
Group -
The Ubuntu operating system must generate audit records for the /var/log/wtmp file.
Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...Rule Medium Severity -
SRG-OS-000472-GPOS-00217
Group -
The Ubuntu operating system must generate audit records for the /var/run/utmp file.
Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...Rule Medium Severity -
SRG-OS-000472-GPOS-00217
Group -
The Ubuntu operating system must generate audit records for the /var/log/btmp file.
Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...Rule Medium Severity -
SRG-OS-000476-GPOS-00221
Group -
SRG-OS-000476-GPOS-00221
Group -
SRG-OS-000476-GPOS-00221
Group -
The Ubuntu operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/gshadow.
Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...Rule Medium Severity -
SRG-OS-000476-GPOS-00221
Group -
The Ubuntu operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.
Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...Rule Medium Severity -
SRG-OS-000476-GPOS-00221
Group -
The Ubuntu operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/security/opasswd.
Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an in...Rule Medium Severity -
SRG-OS-000038-GPOS-00016
Group -
SRG-OS-000046-GPOS-00022
Group -
SRG-OS-000047-GPOS-00023
Group -
SRG-OS-000058-GPOS-00028
Group -
The Ubuntu operating system must be configured so that audit log files cannot be read or write-accessible by unauthorized users.
If audit information were to become compromised, then forensic analysis and discovery of the true source of potentially malicious system activity is impossible to achieve. To ensure the veracity o...Rule Medium Severity -
SRG-OS-000058-GPOS-00028
Group -
The Ubuntu operating system must permit only authorized accounts ownership of the audit log files.
If audit information were to become compromised, then forensic analysis and discovery of the true source of potentially malicious system activity is impossible to achieve. To ensure the veracity o...Rule Medium Severity -
SRG-OS-000058-GPOS-00028
Group -
SRG-OS-000059-GPOS-00029
Group -
SRG-OS-000059-GPOS-00029
Group -
The Ubuntu operating system must allow only authorized accounts to own the audit log directory.
If audit information were to become compromised, then forensic analysis and discovery of the true source of potentially malicious system activity is impossible to achieve. To ensure the veracity o...Rule Medium Severity -
SRG-OS-000059-GPOS-00029
Group -
SRG-OS-000063-GPOS-00032
Group -
The Ubuntu operating system must be configured so that audit configuration files are not write-accessible by unauthorized users.
Without the capability to restrict which roles and individuals can select which events are audited, unauthorized personnel may be able to prevent the auditing of critical events. Misconfigured audi...Rule Medium Severity -
SRG-OS-000063-GPOS-00032
Group -
The Ubuntu operating system must permit only authorized accounts to own the audit configuration files.
Without the capability to restrict which roles and individuals can select which events are audited, unauthorized personnel may be able to prevent the auditing of critical events. Misconfigured audi...Rule Medium Severity -
SRG-OS-000063-GPOS-00032
Group -
SRG-OS-000341-GPOS-00132
Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.