Skip to content

II - Mission Support Public

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000206-GPOS-00084

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must configure /var/log/syslog file with mode 0640 or less permissive.

    &lt;VulnDiscussion&gt;Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an orga...
    Rule Medium Severity
  • SRG-OS-000258-GPOS-00099

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must have directories that contain system commands set to a mode of 0755 or less permissive.

    &lt;VulnDiscussion&gt;Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefo...
    Rule Medium Severity
  • SRG-OS-000258-GPOS-00099

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must have directories that contain system commands owned by root.

    &lt;VulnDiscussion&gt;Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefo...
    Rule Medium Severity
  • SRG-OS-000258-GPOS-00099

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must have directories that contain system commands group-owned by root.

    &lt;VulnDiscussion&gt;Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefo...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system library files must have mode 0755 or less permissive.

    &lt;VulnDiscussion&gt; If the operating system were to allow any user to make changes to software libraries, then those changes might be implemente...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system library directories must have mode 0755 or less permissive.

    &lt;VulnDiscussion&gt; If the operating system were to allow any user to make changes to software libraries, then those changes might be implemente...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system library files must be owned by root.

    &lt;VulnDiscussion&gt; If the operating system were to allow any user to make changes to software libraries, then those changes might be implemente...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system library directories must be owned by root.

    &lt;VulnDiscussion&gt; If the operating system were to allow any user to make changes to software libraries, then those changes might be implemente...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system library files must be group-owned by root or a system account.

    &lt;VulnDiscussion&gt; If the operating system were to allow any user to make changes to software libraries, then those changes might be implemente...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system library directories must be group-owned by root.

    &lt;VulnDiscussion&gt; If the operating system were to allow any user to make changes to software libraries, then those changes might be implemente...
    Rule Medium Severity
  • SRG-OS-000269-GPOS-00103

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must be configured to preserve log records from failure events.

    &lt;VulnDiscussion&gt;Failure to a known state can address safety or security in accordance with the mission/business needs of the organization. Fa...
    Rule Medium Severity
  • SRG-OS-000297-GPOS-00115

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must have an application firewall installed in order to control remote access methods.

    &lt;VulnDiscussion&gt;Remote access services, such as those providing remote access to network devices and information systems, which lack automate...
    Rule Medium Severity
  • SRG-OS-000297-GPOS-00115

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must enable and run the uncomplicated firewall(ufw).

    &lt;VulnDiscussion&gt;Remote access services, such as those providing remote access to network devices and information systems, which lack automate...
    Rule Medium Severity
  • SRG-OS-000355-GPOS-00143

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must, for networked systems, compare internal information system clocks at least every 24 hours with a server which is synchronized to one of the redundant United States Naval Observatory (USNO) time servers, or a time server designated for the appropriate DoD network (NIPRNet/SIPRNet), and/or the Global Positioning System (GPS).

    &lt;VulnDiscussion&gt;Inaccurate time stamps make it more difficult to correlate events and can lead to an inaccurate analysis. Determining the cor...
    Rule Medium Severity
  • SRG-OS-000356-GPOS-00144

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must synchronize internal information system clocks to the authoritative time source when the time difference is greater than one second.

    &lt;VulnDiscussion&gt;Inaccurate time stamps make it more difficult to correlate events and can lead to an inaccurate analysis. Determining the cor...
    Rule Low Severity
  • SRG-OS-000363-GPOS-00150

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must notify designated personnel if baseline configurations are changed in an unauthorized manner. The file integrity tool must notify the system administrator (SA) when changes to the baseline configuration or anomalies in the operation of any security functions are discovered.

    &lt;VulnDiscussion&gt;Unauthorized changes to the baseline configuration could make the system vulnerable to various attacks or allow unauthorized ...
    Rule Medium Severity
  • SRG-OS-000366-GPOS-00153

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system's Advance Package Tool (APT) must be configured to prevent the installation of patches, service packs, device drivers, or Ubuntu operating system components without verification they have been digitally signed using a certificate that is recognized and approved by the organization.

    &lt;VulnDiscussion&gt;Changes to any software components can have significant effects on the overall security of the operating system. This require...
    Rule Medium Severity
  • SRG-OS-000368-GPOS-00154

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must be configured to use AppArmor.

    &lt;VulnDiscussion&gt;Control of program execution is a mechanism used to prevent execution of unauthorized programs. Some operating systems may pr...
    Rule Medium Severity
  • SRG-OS-000380-GPOS-00165

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must allow the use of a temporary password for system logons with an immediate change to a permanent password.

    &lt;VulnDiscussion&gt;Without providing this capability, an account may be created without a password. Non-repudiation cannot be guaranteed once an...
    Rule Medium Severity
  • SRG-OS-000383-GPOS-00166

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must be configured such that Pluggable Authentication Module (PAM) prohibits the use of cached authentications after one day.

    &lt;VulnDiscussion&gt;If cached authentication information is out-of-date, the validity of the authentication information may be questionable.&lt;/...
    Rule Low Severity
  • SRG-OS-000396-GPOS-00176

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must implement NIST FIPS-validated cryptography to protect classified information and for the following: To provision digital signatures, to generate cryptographic hashes, and to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.

    &lt;VulnDiscussion&gt;Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The operating ...
    Rule High Severity
  • SRG-OS-000403-GPOS-00182

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must use DoD PKI-established certificate authorities for verification of the establishment of protected sessions.

    &lt;VulnDiscussion&gt;Untrusted Certificate Authorities (CA) can issue certificates, but they may be issued by organizations or individuals that se...
    Rule Medium Severity
  • SRG-OS-000404-GPOS-00183

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu operating system must implement cryptographic mechanisms to prevent unauthorized modification of all information at rest.

    &lt;VulnDiscussion&gt;Operating systems handling data requiring "data at rest" protections must employ cryptographic mechanisms to prevent unauthor...
    Rule Medium Severity
  • SRG-OS-000405-GPOS-00184

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu operating system must implement cryptographic mechanisms to prevent unauthorized disclosure of all information at rest.

    &lt;VulnDiscussion&gt;Operating systems handling data requiring "data at rest" protections must employ cryptographic mechanisms to prevent unauthor...
    Rule Medium Severity
  • SRG-OS-000420-GPOS-00186

    <GroupDescription></GroupDescription>
    Group
  • The Ubuntu operating system must configure the uncomplicated firewall to rate-limit impacted network interfaces.

    &lt;VulnDiscussion&gt;Denial of service (DoS) is a condition when a resource is not available for legitimate users. When this occurs, the organizat...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules