I - Mission Critical Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000070-GPOS-00038
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must enforce password complexity by requiring that at least one lower-case character be used.
<VulnDiscussion>Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...Rule Low Severity -
SRG-OS-000071-GPOS-00039
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must enforce password complexity by requiring that at least one numeric character be used.
<VulnDiscussion>Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...Rule Low Severity -
SRG-OS-000072-GPOS-00040
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must require the change of at least 8 characters when passwords are changed.
<VulnDiscussion> If the operating system allows the user to consecutively reuse extensive portions of passwords, this increases the chances o...Rule Low Severity -
SRG-OS-000078-GPOS-00046
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must enforce a minimum 15-character password length.
<VulnDiscussion>The shorter the password, the lower the number of possible combinations that need to be tested before the password is comprom...Rule Medium Severity -
SRG-OS-000266-GPOS-00101
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must enforce password complexity by requiring that at least one special character be used.
<VulnDiscussion>Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity o...Rule Low Severity -
SRG-OS-000480-GPOS-00225
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must prevent the use of dictionary words for passwords.
<VulnDiscussion>If the Ubuntu operating system allows the user to select passwords based on dictionary words, then this increases the chances...Rule Medium Severity -
SRG-OS-000480-GPOS-00225
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must be configured so that when passwords are changed or new passwords are established, pwquality must be used.
<VulnDiscussion>Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...Rule Medium Severity -
SRG-OS-000066-GPOS-00034
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system, for PKI-based authentication, must validate certificates by constructing a certification path (which includes status information) to an accepted trust anchor.
<VulnDiscussion>Without path validation, an informed trust decision by the relying party cannot be made when presented with any certificate n...Rule Medium Severity -
SRG-OS-000375-GPOS-00160
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must implement multifactor authentication for remote access to privileged accounts in such a way that one of the factors is provided by a device separate from the system gaining access.
<VulnDiscussion>Using an authentication device, such as a CAC or token that is separate from the information system, ensures that even if the...Rule Medium Severity -
SRG-OS-000376-GPOS-00161
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must accept Personal Identity Verification (PIV) credentials.
<VulnDiscussion>The use of PIV credentials facilitates standardization and reduces the risk of unauthorized access. DoD has mandated the u...Rule Medium Severity -
SRG-OS-000377-GPOS-00162
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must electronically verify Personal Identity Verification (PIV) credentials.
<VulnDiscussion>The use of PIV credentials facilitates standardization and reduces the risk of unauthorized access. DoD has mandated the u...Rule Medium Severity -
SRG-OS-000384-GPOS-00167
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system for PKI-based authentication, must implement a local cache of revocation data in case of the inability to access revocation information via the network.
<VulnDiscussion>Without configuring a local cache of revocation data, there is the potential to allow access to users who are no longer autho...Rule Medium Severity -
SRG-OS-000077-GPOS-00045
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must prohibit password reuse for a minimum of five generations.
<VulnDiscussion>Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute...Rule Low Severity -
SRG-OS-000329-GPOS-00128
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must automatically lock an account until the locked account is released by an administrator when three unsuccessful logon attempts have been made.
<VulnDiscussion>By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise...Rule Low Severity -
SRG-OS-000446-GPOS-00200
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must be configured so that the script which runs each 30 days or less to check file integrity is the default one.
<VulnDiscussion>Without verification of the security functions, security functions may not operate correctly and the failure may go unnoticed...Rule Medium Severity -
SRG-OS-000480-GPOS-00226
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must enforce a delay of at least 4 seconds between logon prompts following a failed logon attempt.
<VulnDiscussion>Limiting the number of logon attempts over a certain time interval reduces the chances that an unauthorized user may gain acc...Rule Low Severity -
SRG-OS-000004-GPOS-00004
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.
<VulnDiscussion>Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing ...Rule Medium Severity -
SRG-OS-000004-GPOS-00004
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.
<VulnDiscussion>Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing ...Rule Medium Severity -
SRG-OS-000004-GPOS-00004
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.
<VulnDiscussion>Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing ...Rule Medium Severity -
SRG-OS-000004-GPOS-00004
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/gshadow.
<VulnDiscussion>Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing ...Rule Medium Severity -
SRG-OS-000004-GPOS-00004
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/opasswd.
<VulnDiscussion>Once an attacker establishes access to a system, the attacker often attempts to create a persistent method of reestablishing ...Rule Medium Severity -
SRG-OS-000046-GPOS-00022
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must alert the ISSO and SA (at a minimum) in the event of an audit processing failure.
<VulnDiscussion>It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required....Rule Medium Severity -
SRG-OS-000047-GPOS-00023
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must shut down by default upon audit failure (unless availability is an overriding concern).
<VulnDiscussion>It is critical that when the operating system is at risk of failing to process audit logs as required, it takes action to mit...Rule Medium Severity -
SRG-OS-000057-GPOS-00027
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must be configured so that audit log files are not read or write-accessible by unauthorized users.
<VulnDiscussion>Unauthorized disclosure of audit records can reveal system and configuration data to attackers, thus compromising its confide...Rule Medium Severity -
SRG-OS-000057-GPOS-00027
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must be configured to permit only authorized users ownership of the audit log files.
<VulnDiscussion>Unauthorized disclosure of audit records can reveal system and configuration data to attackers, thus compromising its confide...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.