Skip to content

II - Mission Support Public

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000433-GPOS-00192

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must implement nonexecutable data to protect its memory from unauthorized code execution.

    &lt;VulnDiscussion&gt;Some adversaries launch attacks with the intent of executing code in nonexecutable regions of memory or in memory locations t...
    Rule Medium Severity
  • SRG-OS-000433-GPOS-00193

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must implement address space layout randomization to protect its memory from unauthorized code execution.

    &lt;VulnDiscussion&gt;Some adversaries launch attacks with the intent of executing code in non-executable regions of memory or in memory locations ...
    Rule Medium Severity
  • SRG-OS-000437-GPOS-00194

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must be configured so that Advance Package Tool (APT) removes all software components after updated versions have been installed.

    &lt;VulnDiscussion&gt;Previous versions of software components that are not removed from the information system after updates have been installed m...
    Rule Medium Severity
  • SRG-OS-000445-GPOS-00199

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must use a file integrity tool to verify correct operation of all security functions.

    &lt;VulnDiscussion&gt;Without verification of the security functions, security functions may not operate correctly and the failure may go unnoticed...
    Rule Medium Severity
  • SRG-OS-000447-GPOS-00201

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must notify designated personnel if baseline configurations are changed in an unauthorized manner. The file integrity tool must notify the System Administrator when changes to the baseline configuration or anomalies in the operation of any security functions are discovered.

    &lt;VulnDiscussion&gt;Unauthorized changes to the baseline configuration could make the system vulnerable to various attacks or allow unauthorized ...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must display the date and time of the last successful account logon upon logon.

    &lt;VulnDiscussion&gt;Configuration settings are the set of parameters that can be changed in hardware, software, or firmware components of the sys...
    Rule Low Severity
  • SRG-OS-000480-GPOS-00232

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must have an application firewall enabled.

    &lt;VulnDiscussion&gt;Firewalls protect computers from network attacks by blocking or limiting access to open network ports. Application firewalls ...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must have system commands set to a mode of 0755 or less permissive.

    &lt;VulnDiscussion&gt;If the Ubuntu operating system were to allow any user to make changes to software libraries, then those changes might be impl...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must have system commands owned by root or a system account.

    &lt;VulnDiscussion&gt;If the Ubuntu operating system were to allow any user to make changes to software libraries, then those changes might be impl...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must have system commands group-owned by root or a system account.

    &lt;VulnDiscussion&gt;If the Ubuntu operating system were to allow any user to make changes to software libraries, then those changes might be impl...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must disable the x86 Ctrl-Alt-Delete key sequence if a graphical user interface is installed.

    &lt;VulnDiscussion&gt;A locally logged-on user who presses Ctrl-Alt-Delete, when at the console, can reboot the system. If accidentally pressed, as...
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must disable the x86 Ctrl-Alt-Delete key sequence.

    &lt;VulnDiscussion&gt;A locally logged-on user who presses Ctrl-Alt-Delete, when at the console, can reboot the system. If accidentally pressed, as...
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must not have accounts configured with blank or null passwords.

    &lt;VulnDiscussion&gt;If an account has an empty password, anyone could log on and run commands with the privileges of that account. Accounts with ...
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must not allow accounts configured with blank or null passwords.

    &lt;VulnDiscussion&gt;If an account has an empty password, anyone could log on and run commands with the privileges of that account. Accounts with ...
    Rule High Severity
  • SRG-OS-000378-GPOS-00163

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must disable automatic mounting of Universal Serial Bus (USB) mass storage driver.

    &lt;VulnDiscussion&gt;Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. ...
    Rule Medium Severity
  • SRG-OS-000481-GPOS-00481

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must disable all wireless network adapters.

    &lt;VulnDiscussion&gt;Without protection of communications with wireless peripherals, confidentiality and integrity may be compromised because unpr...
    Rule Medium Severity
  • SRG-OS-000250-GPOS-00093

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system SSH server must be configured to use only FIPS-validated key exchange algorithms.

    &lt;VulnDiscussion&gt;Without cryptographic integrity protections provided by FIPS-validated cryptographic algorithms, information can be viewed an...
    Rule Medium Severity
  • SRG-OS-000138-GPOS-00069

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must restrict access to the kernel message buffer.

    &lt;VulnDiscussion&gt;Restricting access to the kernel message buffer limits access only to root. This prevents attackers from gaining additional s...
    Rule Low Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules