Canonical Ubuntu 22.04 LTS Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
SRG-OS-000433-GPOS-00192
<GroupDescription></GroupDescription>Group -
SRG-OS-000392-GPOS-00172
<GroupDescription></GroupDescription>Group -
Ubuntu 22.04 LTS must disable the x86 Ctrl-Alt-Delete key sequence.
<VulnDiscussion>A locally logged-on user who presses Ctrl-Alt-Delete, when at the console, can reboot the system. If accidentally pressed, as...Rule High Severity -
SRG-OS-000080-GPOS-00048
<GroupDescription></GroupDescription>Group -
Ubuntu 22.04 LTS, when booted, must require authentication upon booting into single-user and maintenance modes.
<VulnDiscussion>To mitigate the risk of unauthorized access to sensitive information by entities that have been issued certificates by DOD-ap...Rule High Severity -
SRG-OS-000254-GPOS-00095
<GroupDescription></GroupDescription>Group -
Ubuntu 22.04 LTS must initiate session audits at system startup.
<VulnDiscussion>If auditing is enabled late in the startup process, the actions of some startup processes may not be audited. Some audit syst...Rule Medium Severity -
SRG-OS-000138-GPOS-00069
<GroupDescription></GroupDescription>Group -
Ubuntu 22.04 LTS must restrict access to the kernel message buffer.
<VulnDiscussion>Restricting access to the kernel message buffer limits access only to root. This prevents attackers from gaining additional s...Rule Low Severity -
SRG-OS-000184-GPOS-00078
<GroupDescription></GroupDescription>Group -
Ubuntu 22.04 LTS must disable kernel core dumps so that it can fail to a secure state if system initialization fails, shutdown fails or aborts fail.
<VulnDiscussion>Kernel core dumps may contain the full contents of system memory at the time of the crash. Kernel core dumps may consume a co...Rule Medium Severity -
SRG-OS-000433-GPOS-00193
<GroupDescription></GroupDescription>Group -
Ubuntu 22.04 LTS must implement address space layout randomization to protect its memory from unauthorized code execution.
<VulnDiscussion>Some adversaries launch attacks with the intent of executing code in nonexecutable regions of memory or in prohibited memory ...Rule Medium Severity -
Ubuntu 22.04 LTS must implement nonexecutable data to protect its memory from unauthorized code execution.
<VulnDiscussion>Some adversaries launch attacks with the intent of executing code in nonexecutable regions of memory or in memory locations t...Rule Medium Severity -
SRG-OS-000366-GPOS-00153
<GroupDescription></GroupDescription>Group -
Ubuntu 22.04 LTS must be configured so that the Advance Package Tool (APT) prevents the installation of patches, service packs, device drivers, or operating system components without verification they have been digitally signed using a certificate that is recognized and approved by the organization.
<VulnDiscussion>Changes to any software components can have significant effects on the overall security of the operating system. This require...Rule Low Severity -
SRG-OS-000437-GPOS-00194
<GroupDescription></GroupDescription>Group -
Ubuntu 22.04 LTS must be configured so that the Advance Package Tool (APT) removes all software components after updated versions have been installed.
<VulnDiscussion>Previous versions of software components that are not removed from the information system after updates have been installed m...Rule Medium Severity -
SRG-OS-000480-GPOS-00225
<GroupDescription></GroupDescription>Group -
Ubuntu 22.04 LTS must have the "libpam-pwquality" package installed.
<VulnDiscussion>Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Ubuntu 22.04 LTS must have the "chrony" package installed.
<VulnDiscussion>Inaccurate time stamps make it more difficult to correlate events and can lead to an inaccurate analysis. Determining the cor...Rule Low Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Ubuntu 22.04 LTS must not have the "systemd-timesyncd" package installed.
<VulnDiscussion>Inaccurate time stamps make it more difficult to correlate events and can lead to an inaccurate analysis. Determining the cor...Rule Low Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
Ubuntu 22.04 LTS must not have the "ntp" package installed.
<VulnDiscussion>Inaccurate time stamps make it more difficult to correlate events and can lead to an inaccurate analysis. Determining the cor...Rule Low Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
Ubuntu 22.04 LTS must not have the "rsh-server" package installed.
<VulnDiscussion>It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission ob...Rule High Severity -
SRG-OS-000074-GPOS-00042
<GroupDescription></GroupDescription>Group -
Ubuntu 22.04 LTS must not have the "telnet" package installed.
<VulnDiscussion>It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission ob...Rule High Severity -
SRG-OS-000185-GPOS-00079
<GroupDescription></GroupDescription>Group -
Ubuntu 22.04 LTS must implement cryptographic mechanisms to prevent unauthorized disclosure and modification of all information that requires protection at rest.
<VulnDiscussion>Operating systems handling data requiring "data at rest" protections must employ cryptographic mechanisms to prevent unauthor...Rule Medium Severity -
SRG-OS-000258-GPOS-00099
<GroupDescription></GroupDescription>Group -
Ubuntu 22.04 LTS must have directories that contain system commands set to a mode of "755" or less permissive.
<VulnDiscussion>Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefo...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
<GroupDescription></GroupDescription>Group -
Ubuntu 22.04 LTS must have system commands set to a mode of "755" or less permissive.
<VulnDiscussion>If Ubuntu 22.04 LTS were to allow any user to make changes to software libraries, then those changes might be implemented wit...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
<GroupDescription></GroupDescription>Group -
Ubuntu 22.04 LTS library files must have mode "755" or less permissive.
<VulnDiscussion>If the operating system were to allow any user to make changes to software libraries, then those changes might be implemented...Rule Medium Severity -
SRG-OS-000206-GPOS-00084
<GroupDescription></GroupDescription>Group -
Ubuntu 22.04 LTS must configure the "/var/log" directory to have mode "755" or less permissive.
<VulnDiscussion>Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an orga...Rule Medium Severity -
SRG-OS-000205-GPOS-00083
<GroupDescription></GroupDescription>Group -
Ubuntu 22.04 LTS must generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.
<VulnDiscussion>Any operating system providing too much information in error messages risks compromising the data and security of the structu...Rule Medium Severity -
SRG-OS-000205-GPOS-00083
<GroupDescription></GroupDescription>Group -
Ubuntu 22.04 LTS must generate system journal entries without revealing information that could be exploited by adversaries.
<VulnDiscussion>Any operating system providing too much information in error messages risks compromising the data and security of the structu...Rule Medium Severity -
SRG-OS-000206-GPOS-00084
<GroupDescription></GroupDescription>Group -
Ubuntu 22.04 LTS must configure "/var/log/syslog" file with mode "640" or less permissive.
<VulnDiscussion>Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an orga...Rule Medium Severity -
SRG-OS-000256-GPOS-00097
<GroupDescription></GroupDescription>Group -
Ubuntu 22.04 LTS must configure audit tools with a mode of "755" or less permissive.
<VulnDiscussion>Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefo...Rule Medium Severity -
SRG-OS-000258-GPOS-00099
<GroupDescription></GroupDescription>Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.