Skip to content

Canonical Ubuntu 20.04 LTS Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • The Ubuntu operating system must be configured so that remote X connections are disabled, unless to fulfill documented and validated mission requirements.

    <VulnDiscussion>The security risk of using X11 forwarding is that the client's X11 display server may be exposed to attack when the SSH clien...
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system SSH daemon must prevent remote hosts from connecting to the proxy display.

    &lt;VulnDiscussion&gt;When X11 forwarding is enabled, there may be additional exposure to the server and client displays if the sshd proxy display ...
    Rule Medium Severity
  • SRG-OS-000069-GPOS-00037

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must enforce password complexity by requiring that at least one upper-case character be used.

    &lt;VulnDiscussion&gt;Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...
    Rule Low Severity
  • SRG-OS-000070-GPOS-00038

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must enforce password complexity by requiring that at least one lower-case character be used.

    &lt;VulnDiscussion&gt;Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...
    Rule Low Severity
  • SRG-OS-000071-GPOS-00039

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must enforce password complexity by requiring that at least one numeric character be used.

    &lt;VulnDiscussion&gt;Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...
    Rule Low Severity
  • SRG-OS-000072-GPOS-00040

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must require the change of at least 8 characters when passwords are changed.

    &lt;VulnDiscussion&gt; If the operating system allows the user to consecutively reuse extensive portions of passwords, this increases the chances o...
    Rule Low Severity
  • SRG-OS-000078-GPOS-00046

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must enforce a minimum 15-character password length.

    &lt;VulnDiscussion&gt;The shorter the password, the lower the number of possible combinations that need to be tested before the password is comprom...
    Rule Medium Severity
  • SRG-OS-000266-GPOS-00101

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must enforce password complexity by requiring that at least one special character be used.

    &lt;VulnDiscussion&gt;Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity o...
    Rule Low Severity
  • SRG-OS-000480-GPOS-00225

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must prevent the use of dictionary words for passwords.

    &lt;VulnDiscussion&gt;If the Ubuntu operating system allows the user to select passwords based on dictionary words, then this increases the chances...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00225

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must be configured so that when passwords are changed or new passwords are established, pwquality must be used.

    &lt;VulnDiscussion&gt;Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...
    Rule Medium Severity
  • SRG-OS-000066-GPOS-00034

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system, for PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor.

    &lt;VulnDiscussion&gt;Without path validation, an informed trust decision by the relying party cannot be made when presented with any certificate n...
    Rule Medium Severity
  • SRG-OS-000375-GPOS-00160

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must implement multifactor authentication for remote access to privileged accounts in such a way that one of the factors is provided by a device separate from the system gaining access.

    &lt;VulnDiscussion&gt;Using an authentication device, such as a CAC or token that is separate from the information system, ensures that even if the...
    Rule Medium Severity
  • SRG-OS-000376-GPOS-00161

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must accept Personal Identity Verification (PIV) credentials.

    &lt;VulnDiscussion&gt;The use of PIV credentials facilitates standardization and reduces the risk of unauthorized access. DoD has mandated the u...
    Rule Medium Severity
  • SRG-OS-000377-GPOS-00162

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must electronically verify Personal Identity Verification (PIV) credentials.

    &lt;VulnDiscussion&gt;The use of PIV credentials facilitates standardization and reduces the risk of unauthorized access. DoD has mandated the u...
    Rule Medium Severity
  • The Ubuntu operating system for PKI-based authentication, must implement a local cache of revocation data in case of the inability to access revocation information via the network.

    &lt;VulnDiscussion&gt;Without configuring a local cache of revocation data, there is the potential to allow access to users who are no longer autho...
    Rule Medium Severity
  • SRG-OS-000077-GPOS-00045

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must prohibit password reuse for a minimum of five generations.

    &lt;VulnDiscussion&gt;Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute...
    Rule Low Severity
  • SRG-OS-000329-GPOS-00128

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must automatically lock an account until the locked account is released by an administrator when three unsuccessful logon attempts have been made.

    &lt;VulnDiscussion&gt;By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise...
    Rule Low Severity
  • SRG-OS-000446-GPOS-00200

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must be configured so that the script which runs each 30 days or less to check file integrity is the default one.

    &lt;VulnDiscussion&gt;Without verification of the security functions, security functions may not operate correctly and the failure may go unnoticed...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00226

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must enforce a delay of at least 4 seconds between logon prompts following a failed logon attempt.

    &lt;VulnDiscussion&gt;Limiting the number of logon attempts over a certain time interval reduces the chances that an unauthorized user may gain acc...
    Rule Low Severity
  • SRG-OS-000004-GPOS-00004

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must permit only authorized groups ownership of the audit log files.

    &lt;VulnDiscussion&gt;Unauthorized disclosure of audit records can reveal system and configuration data to attackers, thus compromising its confide...
    Rule Medium Severity
  • SRG-OS-000059-GPOS-00029

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.

    &lt;VulnDiscussion&gt;Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing ...
    Rule Medium Severity
  • SRG-OS-000004-GPOS-00004

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.

    &lt;VulnDiscussion&gt;Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing ...
    Rule Medium Severity
  • SRG-OS-000004-GPOS-00004

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.

    &lt;VulnDiscussion&gt;Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing ...
    Rule Medium Severity
  • SRG-OS-000004-GPOS-00004

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/gshadow.

    &lt;VulnDiscussion&gt;Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing ...
    Rule Medium Severity
  • SRG-OS-000004-GPOS-00004

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must be configured so that the audit log directory is not write-accessible by unauthorized users.

    &lt;VulnDiscussion&gt;If audit information were to become compromised, then forensic analysis and discovery of the true source of potentially malic...
    Rule Medium Severity
  • The Ubuntu operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/opasswd.

    &lt;VulnDiscussion&gt;Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing ...
    Rule Medium Severity
  • SRG-OS-000046-GPOS-00022

    <GroupDescription></GroupDescription>
    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules