Skip to content

II - Mission Support Public

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000476-GPOS-00221

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/security/opasswd.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-OS-000038-GPOS-00016

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must produce audit records and reports containing information to establish when, where, what type, the source, and the outcome for all DoD-defined auditable events and actions in near real time.

    &lt;VulnDiscussion&gt;Without establishing the when, where, type, source, and outcome of events that occurred, it would be difficult to establish, ...
    Rule Medium Severity
  • SRG-OS-000046-GPOS-00022

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must alert the ISSO and SA (at a minimum) in the event of an audit processing failure.

    &lt;VulnDiscussion&gt;It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required....
    Rule Medium Severity
  • SRG-OS-000047-GPOS-00023

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must shut down by default upon audit failure (unless availability is an overriding concern).

    &lt;VulnDiscussion&gt;It is critical that when the Ubuntu operating system is at risk of failing to process audit logs as required, it takes action...
    Rule Medium Severity
  • SRG-OS-000058-GPOS-00028

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must be configured so that audit log files cannot be read or write-accessible by unauthorized users.

    &lt;VulnDiscussion&gt;If audit information were to become compromised, then forensic analysis and discovery of the true source of potentially malic...
    Rule Medium Severity
  • SRG-OS-000058-GPOS-00028

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must permit only authorized accounts ownership of the audit log files.

    &lt;VulnDiscussion&gt;If audit information were to become compromised, then forensic analysis and discovery of the true source of potentially malic...
    Rule Medium Severity
  • SRG-OS-000058-GPOS-00028

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must permit only authorized groups to own the audit log files.

    &lt;VulnDiscussion&gt;If audit information were to become compromised, then forensic analysis and discovery of the true source of potentially malic...
    Rule Medium Severity
  • SRG-OS-000059-GPOS-00029

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must be configured so that the audit log directory is not write-accessible by unauthorized users.

    &lt;VulnDiscussion&gt;If audit information were to become compromised, then forensic analysis and discovery of the true source of potentially malic...
    Rule Medium Severity
  • SRG-OS-000059-GPOS-00029

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must allow only authorized accounts to own the audit log directory.

    &lt;VulnDiscussion&gt;If audit information were to become compromised, then forensic analysis and discovery of the true source of potentially malic...
    Rule Medium Severity
  • SRG-OS-000059-GPOS-00029

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must ensure only authorized groups can own the audit log directory and its underlying files.

    &lt;VulnDiscussion&gt;If audit information were to become compromised, then forensic analysis and discovery of the true source of potentially malic...
    Rule Medium Severity
  • SRG-OS-000063-GPOS-00032

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must be configured so that audit configuration files are not write-accessible by unauthorized users.

    &lt;VulnDiscussion&gt;Without the capability to restrict which roles and individuals can select which events are audited, unauthorized personnel ma...
    Rule Medium Severity
  • SRG-OS-000063-GPOS-00032

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must permit only authorized accounts to own the audit configuration files.

    &lt;VulnDiscussion&gt;Without the capability to restrict which roles and individuals can select which events are audited, unauthorized personnel ma...
    Rule Medium Severity
  • SRG-OS-000063-GPOS-00032

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must permit only authorized groups to own the audit configuration files.

    &lt;VulnDiscussion&gt;Without the capability to restrict which roles and individuals can select which events are audited, unauthorized personnel ma...
    Rule Medium Severity
  • SRG-OS-000341-GPOS-00132

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must allocate audit record storage capacity to store at least one weeks worth of audit records, when audit records are not immediately sent to a central audit record storage facility.

    &lt;VulnDiscussion&gt;In order to ensure Ubuntu operating systems have sufficient storage capacity in which to write the audit logs, Ubuntu operati...
    Rule Low Severity
  • SRG-OS-000064-GPOS-00033

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the su command.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-OS-000064-GPOS-00033

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the chfn command.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-OS-000064-GPOS-00033

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the mount command.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-OS-000064-GPOS-00033

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the umount command.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-OS-000064-GPOS-00033

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the ssh-agent command.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-OS-000064-GPOS-00033

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the ssh-keysign command.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-OS-000064-GPOS-00033

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must generate audit records for any usage of the setxattr, fsetxattr, lsetxattr, removexattr, fremovexattr, and lremovexattr system calls.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-OS-000064-GPOS-00033

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the chown, fchown, fchownat, and lchown system calls.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-OS-000064-GPOS-00033

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the chmod, fchmod, and fchmodat system calls.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-OS-000064-GPOS-00033

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the creat, open, openat, open_by_handle_at, truncate, and ftruncate system calls.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-OS-000064-GPOS-00033

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the sudo command.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules