Canonical Ubuntu 20.04 LTS Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
The Ubuntu operating system must alert the ISSO and SA (at a minimum) in the event of an audit processing failure.
<VulnDiscussion>It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required....Rule Medium Severity -
SRG-OS-000047-GPOS-00023
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must shut down by default upon audit failure (unless availability is an overriding concern).
<VulnDiscussion>It is critical that when the operating system is at risk of failing to process audit logs as required, it takes action to mit...Rule Medium Severity -
SRG-OS-000057-GPOS-00027
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must be configured so that audit log files are not read or write-accessible by unauthorized users.
<VulnDiscussion>Unauthorized disclosure of audit records can reveal system and configuration data to attackers, thus compromising its confide...Rule Medium Severity -
SRG-OS-000057-GPOS-00027
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must be configured to permit only authorized users ownership of the audit log files.
<VulnDiscussion>Unauthorized disclosure of audit records can reveal system and configuration data to attackers, thus compromising its confide...Rule Medium Severity -
SRG-OS-000057-GPOS-00027
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must be configured so that audit configuration files are not write-accessible by unauthorized users.
<VulnDiscussion>Without the capability to restrict which roles and individuals can select which events are audited, unauthorized personnel ma...Rule Medium Severity -
SRG-OS-000063-GPOS-00032
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must permit only authorized accounts to own the audit configuration files.
<VulnDiscussion>Without the capability to restrict which roles and individuals can select which events are audited, unauthorized personnel ma...Rule Medium Severity -
SRG-OS-000063-GPOS-00032
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must permit only authorized groups to own the audit configuration files.
<VulnDiscussion>Without the capability to restrict which roles and individuals can select which events are audited, unauthorized personnel ma...Rule Medium Severity -
SRG-OS-000064-GPOS-00033
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the su command.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-OS-000064-GPOS-00033
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the chfn command.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-OS-000064-GPOS-00033
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the mount command.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-OS-000064-GPOS-00033
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the umount command.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-OS-000064-GPOS-00033
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the ssh-agent command.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-OS-000064-GPOS-00033
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the ssh-keysign command.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-OS-000064-GPOS-00033
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must generate audit records for any use of the setxattr, fsetxattr, lsetxattr, removexattr, fremovexattr, and lremovexattr system calls.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-OS-000064-GPOS-00033
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the chown, fchown, fchownat, and lchown system calls.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-OS-000064-GPOS-00033
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the chmod, fchmod, and fchmodat system calls.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-OS-000064-GPOS-00033
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the creat, open, openat, open_by_handle_at, truncate, and ftruncate system calls.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-OS-000064-GPOS-00033
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the sudo command.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-OS-000064-GPOS-00033
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the sudoedit command.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-OS-000064-GPOS-00033
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the chsh command.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-OS-000064-GPOS-00033
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the newgrp command.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-OS-000064-GPOS-00033
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the chcon command.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-OS-000064-GPOS-00033
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the apparmor_parser command.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-OS-000064-GPOS-00033
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the setfacl command.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-OS-000064-GPOS-00033
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the chacl command.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-OS-000064-GPOS-00033
<GroupDescription></GroupDescription>Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.