Skip to content

Canonical Ubuntu 20.04 LTS Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-OS-000259-GPOS-00100

    <GroupDescription></GroupDescription>
    Group
  • SRG-OS-000063-GPOS-00032

    <GroupDescription></GroupDescription>
    Group
  • SRG-OS-000002-GPOS-00002

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must provision temporary user accounts with an expiration time of 72 hours or less.

    &lt;VulnDiscussion&gt;If temporary user accounts remain active when no longer needed or for an excessive period, these accounts may be used to gain...
    Rule Medium Severity
  • SRG-OS-000023-GPOS-00006

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must enable the graphical user logon banner to display the Standard Mandatory DoD Notice and Consent Banner before granting local access to the system via a graphical user logon.

    &lt;VulnDiscussion&gt;Display of a standardized and approved use notification before granting access to the Ubuntu operating system ensures privacy...
    Rule Medium Severity
  • SRG-OS-000023-GPOS-00006

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must display the Standard Mandatory DOD Notice and Consent Banner before granting local access to the system via a graphical user logon.

    &lt;VulnDiscussion&gt;Display of a standardized and approved use notification before granting access to the Ubuntu operating system ensures privacy...
    Rule Medium Severity
  • SRG-OS-000028-GPOS-00009

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must retain a user's session lock until that user reestablishes access using established identification and authentication procedures.

    &lt;VulnDiscussion&gt;A session lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the ...
    Rule Medium Severity
  • SRG-OS-000030-GPOS-00011

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must allow users to directly initiate a session lock for all connection types.

    &lt;VulnDiscussion&gt;A session lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the ...
    Rule Medium Severity
  • SRG-OS-000068-GPOS-00036

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must map the authenticated identity to the user or group account for PKI-based authentication.

    &lt;VulnDiscussion&gt;Without mapping the certificate used to authenticate to the user account, the ability to determine the identity of the indivi...
    Rule High Severity
  • SRG-OS-000075-GPOS-00043

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must enforce 24 hours/1 day as the minimum password lifetime. Passwords for new users must have a 24 hours/1 day minimum password lifetime restriction.

    &lt;VulnDiscussion&gt;Enforcing a minimum password lifetime helps to prevent repeated password changes to defeat the password reuse or history enfo...
    Rule Low Severity
  • SRG-OS-000076-GPOS-00044

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must enforce a 60-day maximum password lifetime restriction. Passwords for new users must have a 60-day maximum password lifetime restriction.

    &lt;VulnDiscussion&gt;Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed periodically. If the ...
    Rule Low Severity
  • SRG-OS-000080-GPOS-00048

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must require users to reauthenticate for privilege escalation or when changing roles.

    &lt;VulnDiscussion&gt;Without reauthentication, users may access resources or perform tasks for which they do not have authorization. When oper...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00228

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu operating systems when booted must require authentication upon booting into single-user and maintenance modes.

    &lt;VulnDiscussion&gt;To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DoD-ap...
    Rule High Severity
  • SRG-OS-000104-GPOS-00051

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must uniquely identify interactive users.

    &lt;VulnDiscussion&gt;To assure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to pre...
    Rule Medium Severity
  • SRG-OS-000134-GPOS-00068

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must ensure only users who need access to security functions are part of sudo group.

    &lt;VulnDiscussion&gt;An isolation boundary provides access control and protects the integrity of the hardware, software, and firmware that perform...
    Rule High Severity
  • SRG-OS-000279-GPOS-00109

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must automatically terminate a user session after inactivity timeouts have expired.

    &lt;VulnDiscussion&gt;Automatic session termination addresses the termination of user-initiated logical sessions in contrast to the termination of ...
    Rule Medium Severity
  • SRG-OS-000373-GPOS-00156

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system default filesystem permissions must be defined in such a way that all authenticated users can read and modify only their own files.

    &lt;VulnDiscussion&gt;Setting the most restrictive default permissions ensures that when new accounts are created they do not have unnecessary acce...
    Rule Medium Severity
  • SRG-OS-000105-GPOS-00052

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must implement smart card logins for multifactor authentication for local and network access to privileged and nonprivileged accounts.

    &lt;VulnDiscussion&gt;Without the use of multifactor authentication, the ease of access to privileged functions is greatly increased. Multifactor...
    Rule Medium Severity
  • SRG-OS-000125-GPOS-00065

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must use strong authenticators in establishing nonlocal maintenance and diagnostic sessions.

    &lt;VulnDiscussion&gt;Nonlocal maintenance and diagnostic activities are those activities conducted by individuals communicating through a network,...
    Rule Medium Severity
  • SRG-OS-000126-GPOS-00066

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must immediately terminate all network connections associated with SSH traffic after a period of inactivity.

    &lt;VulnDiscussion&gt;Automatic session termination addresses the termination of user-initiated logical sessions in contrast to the termination of ...
    Rule Medium Severity
  • SRG-OS-000163-GPOS-00072

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must immediately terminate all network connections associated with SSH traffic at the end of the session or after 10 minutes of inactivity.

    &lt;VulnDiscussion&gt;Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take c...
    Rule Medium Severity
  • SRG-OS-000228-GPOS-00088

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must display the Standard Mandatory DOD Notice and Consent Banner before granting any local or remote connection to the system.

    &lt;VulnDiscussion&gt;Display of a standardized and approved use notification before granting access to the publicly accessible operating system en...
    Rule Medium Severity
  • SRG-OS-000423-GPOS-00187

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must use SSH to protect the confidentiality and integrity of transmitted information.

    &lt;VulnDiscussion&gt;Without protection of the transmitted information, confidentiality and integrity may be compromised because unprotected commu...
    Rule High Severity
  • SRG-OS-000424-GPOS-00188

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must configure the SSH daemon to use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hashes to prevent the unauthorized disclosure of information and/or detect changes to information during transmission.

    &lt;VulnDiscussion&gt;Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote acc...
    Rule Medium Severity
  • SRG-OS-000424-GPOS-00188

    <GroupDescription></GroupDescription>
    Group
  • SRG-OS-000384-GPOS-00167

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must configure the SSH daemon to use FIPS 140-2 approved ciphers to prevent the unauthorized disclosure of information and/or detect changes to information during transmission.

    &lt;VulnDiscussion&gt;Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote acc...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00229

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must not allow unattended or automatic login via SSH.

    &lt;VulnDiscussion&gt;Failure to restrict system access to authenticated users negatively impacts Ubuntu operating system security.&lt;/VulnDiscuss...
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules