I - Mission Critical Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000064-GPOS-00033
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must generate audit records for the use and modification of the lastlog file.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-OS-000064-GPOS-00033
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the passwd command.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-OS-000064-GPOS-00033
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the unix_update command.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-OS-000064-GPOS-00033
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the gpasswd command.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-OS-000064-GPOS-00033
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the chage command.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-OS-000064-GPOS-00033
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the usermod command.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-OS-000064-GPOS-00033
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the crontab command.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-OS-000064-GPOS-00033
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the pam_timestamp_check command.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-OS-000064-GPOS-00033
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the init_module and finit_module syscalls.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-OS-000064-GPOS-00033
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the delete_module syscall.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-OS-000122-GPOS-00063
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must produce audit records and reports containing information to establish when, where, what type, the source, and the outcome for all DoD-defined auditable events and actions in near real time.
<VulnDiscussion>Without establishing the when, where, type, source, and outcome of events that occurred, it would be difficult to establish, ...Rule Medium Severity -
SRG-OS-000254-GPOS-00095
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must initiate session audits at system start-up.
<VulnDiscussion>If auditing is enabled late in the start-up process, the actions of some start-up processes may not be audited. Some audit sy...Rule Medium Severity -
SRG-OS-000256-GPOS-00097
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must configure audit tools with a mode of 0755 or less permissive.
<VulnDiscussion>Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefo...Rule Medium Severity -
SRG-OS-000256-GPOS-00097
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must configure audit tools to be owned by root.
<VulnDiscussion>Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefo...Rule Medium Severity -
SRG-OS-000256-GPOS-00097
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must configure the audit tools to be group-owned by root.
<VulnDiscussion>Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefo...Rule Medium Severity -
SRG-OS-000278-GPOS-00108
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must use cryptographic mechanisms to protect the integrity of audit tools.
<VulnDiscussion>Protecting the integrity of the tools used for auditing purposes is a critical step toward ensuring the integrity of audit in...Rule Medium Severity -
SRG-OS-000326-GPOS-00126
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must prevent all software from executing at higher privilege levels than users executing the software and the audit system must be configured to audit the execution of privileged functions.
<VulnDiscussion>In certain situations, software applications/programs need to execute with elevated privileges to perform required functions....Rule Medium Severity -
SRG-OS-000341-GPOS-00132
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must allocate audit record storage capacity to store at least one weeks' worth of audit records, when audit records are not immediately sent to a central audit record storage facility.
<VulnDiscussion>In order to ensure operating systems have a sufficient storage capacity in which to write the audit logs, operating systems n...Rule Low Severity -
SRG-OS-000342-GPOS-00133
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system audit event multiplexor must be configured to off-load audit logs onto a different system or storage media from the system being audited.
<VulnDiscussion>Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a comm...Rule Low Severity -
SRG-OS-000343-GPOS-00134
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must immediately notify the SA and ISSO (at a minimum) when allocated audit record storage volume reaches 75% of the repository maximum audit record storage capacity.
<VulnDiscussion>If security personnel are not notified immediately when storage volume reaches 75% utilization, they are unable to plan for a...Rule Low Severity -
SRG-OS-000359-GPOS-00146
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must record time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT).
<VulnDiscussion>If time stamps are not consistently applied and there is no common time reference, it is difficult to perform forensic analys...Rule Low Severity -
SRG-OS-000392-GPOS-00172
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must generate audit records for privileged activities, nonlocal maintenance, diagnostic sessions and other system-level access.
<VulnDiscussion>If events associated with nonlocal administrative access or diagnostic sessions are not logged, a major tool for assessing an...Rule Medium Severity -
SRG-OS-000468-GPOS-00212
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must generate audit records for any successful/unsuccessful use of unlink, unlinkat, rename, renameat, and rmdir system calls.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-OS-000472-GPOS-00217
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must generate audit records for the /var/log/wtmp file.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-OS-000472-GPOS-00217
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must generate audit records for the /var/run/utmp file.
<VulnDiscussion>Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.