I - Mission Critical Classified
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000032-GPOS-00013
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must monitor remote access methods.
<VulnDiscussion>Remote access services, such as those providing remote access to network devices and information systems, which lack automate...Rule Medium Severity -
SRG-OS-000033-GPOS-00014
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must implement DoD-approved encryption to protect the confidentiality of remote access sessions.
<VulnDiscussion>Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote...Rule Medium Severity -
SRG-OS-000112-GPOS-00057
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must enforce SSHv2 for network access to all accounts.
<VulnDiscussion>A replay attack may enable an unauthorized user to gain access to the operating system. Authentication sessions between the a...Rule High Severity -
SRG-OS-000125-GPOS-00065
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must use strong authenticators in establishing nonlocal maintenance and diagnostic sessions.
<VulnDiscussion>Nonlocal maintenance and diagnostic activities are those activities conducted by individuals communicating through a network,...Rule Medium Severity -
SRG-OS-000126-GPOS-00066
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must immediately terminate all network connections associated with SSH traffic after a period of inactivity.
<VulnDiscussion>Automatic session termination addresses the termination of user-initiated logical sessions in contrast to the termination of ...Rule Medium Severity -
SRG-OS-000163-GPOS-00072
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must automatically terminate all network connections associated with SSH traffic at the end of the session or after 10 minutes of inactivity.
<VulnDiscussion>Automatic session termination addresses the termination of user-initiated logical sessions in contrast to the termination of ...Rule Medium Severity -
SRG-OS-000250-GPOS-00093
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must configure the SSH daemon to only use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hash algorithms to protect the integrity of nonlocal maintenance and diagnostic communications.
<VulnDiscussion>Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Nonlocal ma...Rule Medium Severity -
SRG-OS-000423-GPOS-00187
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must use SSH to protect the confidentiality and integrity of transmitted information unless otherwise protected by alternative physical safeguards, such as, at a minimum, a Protected Distribution System (PDS).
<VulnDiscussion>Without protection of the transmitted information, confidentiality and integrity may be compromised because unprotected commu...Rule High Severity -
SRG-OS-000480-GPOS-00229
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must not allow unattended or automatic login via ssh.
<VulnDiscussion>Failure to restrict system access to authenticated users negatively impacts Ubuntu operating system security.</VulnDiscuss...Rule High Severity -
SRG-OS-000066-GPOS-00034
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system, for PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor.
<VulnDiscussion>Without path validation, an informed trust decision by the relying party cannot be made when presented with any certificate n...Rule Medium Severity -
SRG-OS-000068-GPOS-00036
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must map the authenticated identity to the user or group account for PKI-based authentication.
<VulnDiscussion>Without mapping the certificate used to authenticate to the user account, the ability to determine the identity of the indivi...Rule High Severity -
SRG-OS-000105-GPOS-00052
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must implement smart card logins for multifactor authentication for access to accounts.
<VulnDiscussion>Without the use of multifactor authentication, the ease of access to privileged functions is greatly increased. Multifactor ...Rule Medium Severity -
SRG-OS-000375-GPOS-00160
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must implement multifactor authentication for remote access to privileged accounts in such a way that one of the factors is provided by a device separate from the system gaining access.
<VulnDiscussion>Using an authentication device, such as a CAC or token that is separate from the information system, ensures that even if the...Rule Medium Severity -
SRG-OS-000376-GPOS-00161
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must accept Personal Identity Verification (PIV) credentials.
<VulnDiscussion>The use of PIV credentials facilitates standardization and reduces the risk of unauthorized access. DoD has mandated the use...Rule Medium Severity -
SRG-OS-000377-GPOS-00162
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must implement certificate status checking for multifactor authentication.
<VulnDiscussion>The use of PIV credentials facilitates standardization and reduces the risk of unauthorized access. DoD has mandated the use...Rule Medium Severity -
SRG-OS-000403-GPOS-00182
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must only allow the use of DoD PKI-established certificate authorities for verification of the establishment of protected sessions.
<VulnDiscussion>Untrusted Certificate Authorities (CA) can issue certificates, but they may be issued by organizations or individuals that se...Rule Medium Severity -
SRG-OS-000312-GPOS-00122
<GroupDescription></GroupDescription>Group -
Pam_Apparmor must be configured to allow system administrators to pass information to any other Ubuntu operating system administrator or user, change security attributes, and to confine all non-privileged users from executing functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
<VulnDiscussion>When discretionary access control policies are implemented, subjects are not constrained with regard to what actions they can...Rule Low Severity -
SRG-OS-000368-GPOS-00154
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must be configured to use AppArmor.
<VulnDiscussion>Control of program execution is a mechanism used to prevent execution of unauthorized programs. Some operating systems may pr...Rule Medium Severity -
SRG-OS-000370-GPOS-00155
<GroupDescription></GroupDescription>Group -
The Apparmor module must be configured to employ a deny-all, permit-by-exception policy to allow the execution of authorized software programs and limit the ability of non-privileged users to grant other users direct access to the contents of their home directories/folders.
<VulnDiscussion>Control of program execution is a mechanism used to prevent execution of unauthorized programs. Some operating systems may pr...Rule Medium Severity -
SRG-OS-000104-GPOS-00051
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must uniquely identify interactive users.
<VulnDiscussion>To assure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to pre...Rule Medium Severity -
SRG-OS-000118-GPOS-00060
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must disable account identifiers (individuals, groups, roles, and devices) after 35 days of inactivity.
<VulnDiscussion>Inactive identifiers pose a risk to systems and applications because attackers may exploit an inactive identifier and potenti...Rule Medium Severity -
SRG-OS-000123-GPOS-00064
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must automatically expire temporary accounts within 72 hours.
<VulnDiscussion>Temporary accounts are privileged or nonprivileged accounts that are established during pressing circumstances, such as new s...Rule Low Severity -
SRG-OS-000480-GPOS-00228
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system default filesystem permissions must be defined in such a way that all authenticated users can only read and modify their own files.
<VulnDiscussion>Setting the most restrictive default permissions ensures that when new accounts are created they do not have unnecessary acce...Rule Medium Severity -
SRG-OS-000002-GPOS-00002
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must provision temporary user accounts with an expiration time of 72 hours or less.
<VulnDiscussion>If temporary user accounts remain active when no longer needed or for an excessive period, these accounts may be used to gain...Rule Medium Severity -
SRG-OS-000142-GPOS-00071
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must be configured to use TCP syncookies.
<VulnDiscussion>DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot ac...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.