Canonical Ubuntu 20.04 LTS Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
The Ubuntu operating system must display the date and time of the last successful account logon upon logon.
Configuration settings are the set of parameters that can be changed in hardware, software, or firmware components of the system that affect the security posture and/or functionality of the system....Rule Low Severity -
The Ubuntu operating system must have system commands set to a mode of 0755 or less permissive.
If the Ubuntu operating system were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that ar...Rule Medium Severity -
The Ubuntu operating system must have system commands group-owned by root or a system account.
If the Ubuntu operating system were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that ar...Rule Medium Severity -
The Ubuntu operating system must disable the x86 Ctrl-Alt-Delete key sequence if a graphical user interface is installed.
A locally logged-on user who presses Ctrl-Alt-Delete, when at the console, can reboot the system. If accidentally pressed, as could happen in the case of a mixed OS environment, this can create the...Rule High Severity -
The Ubuntu operating system must disable all wireless network adapters.
Without protection of communications with wireless peripherals, confidentiality and integrity may be compromised because unprotected communications can be intercepted and either read, altered, or u...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
Group -
SRG-OS-000063-GPOS-00032
Group -
SRG-OS-000002-GPOS-00002
Group -
SRG-OS-000023-GPOS-00006
Group -
SRG-OS-000023-GPOS-00006
Group -
The Ubuntu operating system must display the Standard Mandatory DOD Notice and Consent Banner before granting local access to the system via a graphical user logon.
Display of a standardized and approved use notification before granting access to the Ubuntu operating system ensures privacy and security notification verbiage used is consistent with applicable f...Rule Medium Severity -
SRG-OS-000028-GPOS-00009
Group -
SRG-OS-000030-GPOS-00011
Group -
The Ubuntu operating system must allow users to directly initiate a session lock for all connection types.
A session lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the information system but does not want to log out because of the temporary...Rule Medium Severity -
SRG-OS-000068-GPOS-00036
Group -
The Ubuntu operating system must map the authenticated identity to the user or group account for PKI-based authentication.
Without mapping the certificate used to authenticate to the user account, the ability to determine the identity of the individual user or group will not be available for forensic analysis.Rule High Severity -
SRG-OS-000075-GPOS-00043
Group -
The Ubuntu operating system must enforce 24 hours/1 day as the minimum password lifetime. Passwords for new users must have a 24 hours/1 day minimum password lifetime restriction.
Enforcing a minimum password lifetime helps to prevent repeated password changes to defeat the password reuse or history enforcement requirement. If users are allowed to immediately and continually...Rule Low Severity -
SRG-OS-000076-GPOS-00044
Group -
The Ubuntu operating system must enforce a 60-day maximum password lifetime restriction. Passwords for new users must have a 60-day maximum password lifetime restriction.
Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed periodically. If the operating system does not limit the lifetime of passwords and force user...Rule Low Severity -
SRG-OS-000080-GPOS-00048
Group -
The Ubuntu operating system must require users to reauthenticate for privilege escalation or when changing roles.
Without reauthentication, users may access resources or perform tasks for which they do not have authorization. When operating systems provide the capability to escalate a functional capability...Rule Medium Severity -
SRG-OS-000480-GPOS-00228
Group -
SRG-OS-000104-GPOS-00051
Group -
The Ubuntu operating system must uniquely identify interactive users.
To assure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to prevent potential misuse and compromise of the system. Organizational us...Rule Medium Severity -
SRG-OS-000134-GPOS-00068
Group -
The Ubuntu operating system must ensure only users who need access to security functions are part of sudo group.
An isolation boundary provides access control and protects the integrity of the hardware, software, and firmware that perform security functions. Security functions are the hardware, software, a...Rule High Severity -
SRG-OS-000279-GPOS-00109
Group -
SRG-OS-000373-GPOS-00156
Group -
The Ubuntu operating system default filesystem permissions must be defined in such a way that all authenticated users can read and modify only their own files.
Setting the most restrictive default permissions ensures that when new accounts are created they do not have unnecessary access.Rule Medium Severity -
SRG-OS-000105-GPOS-00052
Group -
SRG-OS-000125-GPOS-00065
Group -
The Ubuntu operating system must use strong authenticators in establishing nonlocal maintenance and diagnostic sessions.
Nonlocal maintenance and diagnostic activities are those activities conducted by individuals communicating through a network, either an external network (e.g., the internet) or an internal network....Rule Medium Severity -
SRG-OS-000126-GPOS-00066
Group -
SRG-OS-000163-GPOS-00072
Group -
SRG-OS-000228-GPOS-00088
Group -
The Ubuntu operating system must display the Standard Mandatory DOD Notice and Consent Banner before granting any local or remote connection to the system.
Display of a standardized and approved use notification before granting access to the publicly accessible operating system ensures privacy and security notification verbiage used is consistent with...Rule Medium Severity -
SRG-OS-000423-GPOS-00187
Group -
The Ubuntu operating system must use SSH to protect the confidentiality and integrity of transmitted information.
Without protection of the transmitted information, confidentiality and integrity may be compromised because unprotected communications can be intercepted and either read or altered. This requir...Rule High Severity -
SRG-OS-000424-GPOS-00188
Group -
The Ubuntu operating system must configure the SSH daemon to use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hashes to prevent the unauthorized disclosure of information and/or detect changes to information during transmission.
Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote access (e.g., RDP) is access to DOD nonpublic information systems by an aut...Rule Medium Severity -
SRG-OS-000424-GPOS-00188
Group -
SRG-OS-000384-GPOS-00167
Group -
SRG-OS-000480-GPOS-00229
Group -
The Ubuntu operating system must not allow unattended or automatic login via SSH.
Failure to restrict system access to authenticated users negatively impacts Ubuntu operating system security.Rule High Severity -
SRG-OS-000480-GPOS-00227
Group -
SRG-OS-000480-GPOS-00227
Group -
The Ubuntu operating system SSH daemon must prevent remote hosts from connecting to the proxy display.
When X11 forwarding is enabled, there may be additional exposure to the server and client displays if the sshd proxy display is configured to listen on the wildcard address. By default, sshd binds ...Rule Medium Severity -
SRG-OS-000069-GPOS-00037
Group -
The Ubuntu operating system must enforce password complexity by requiring that at least one upper-case character be used.
Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resistin...Rule Low Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.