I - Mission Critical Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000206-GPOS-00084
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must configure /var/log/syslog file with mode 0640 or less permissive.
<VulnDiscussion>Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an orga...Rule Medium Severity -
SRG-OS-000258-GPOS-00099
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must have directories that contain system commands set to a mode of 0755 or less permissive.
<VulnDiscussion>Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefo...Rule Medium Severity -
SRG-OS-000258-GPOS-00099
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must have directories that contain system commands owned by root.
<VulnDiscussion>Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefo...Rule Medium Severity -
SRG-OS-000258-GPOS-00099
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must have directories that contain system commands group-owned by root.
<VulnDiscussion>Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefo...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system library files must have mode 0755 or less permissive.
<VulnDiscussion> If the operating system were to allow any user to make changes to software libraries, then those changes might be implemente...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system library directories must have mode 0755 or less permissive.
<VulnDiscussion> If the operating system were to allow any user to make changes to software libraries, then those changes might be implemente...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system library files must be owned by root.
<VulnDiscussion> If the operating system were to allow any user to make changes to software libraries, then those changes might be implemente...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system library directories must be owned by root.
<VulnDiscussion> If the operating system were to allow any user to make changes to software libraries, then those changes might be implemente...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system library files must be group-owned by root or a system account.
<VulnDiscussion> If the operating system were to allow any user to make changes to software libraries, then those changes might be implemente...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system library directories must be group-owned by root.
<VulnDiscussion> If the operating system were to allow any user to make changes to software libraries, then those changes might be implemente...Rule Medium Severity -
SRG-OS-000269-GPOS-00103
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must be configured to preserve log records from failure events.
<VulnDiscussion>Failure to a known state can address safety or security in accordance with the mission/business needs of the organization. Fa...Rule Medium Severity -
SRG-OS-000297-GPOS-00115
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must have an application firewall installed in order to control remote access methods.
<VulnDiscussion>Remote access services, such as those providing remote access to network devices and information systems, which lack automate...Rule Medium Severity -
SRG-OS-000297-GPOS-00115
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must enable and run the uncomplicated firewall(ufw).
<VulnDiscussion>Remote access services, such as those providing remote access to network devices and information systems, which lack automate...Rule Medium Severity -
SRG-OS-000355-GPOS-00143
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must, for networked systems, compare internal information system clocks at least every 24 hours with a server which is synchronized to one of the redundant United States Naval Observatory (USNO) time servers, or a time server designated for the appropriate DoD network (NIPRNet/SIPRNet), and/or the Global Positioning System (GPS).
<VulnDiscussion>Inaccurate time stamps make it more difficult to correlate events and can lead to an inaccurate analysis. Determining the cor...Rule Medium Severity -
SRG-OS-000356-GPOS-00144
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must synchronize internal information system clocks to the authoritative time source when the time difference is greater than one second.
<VulnDiscussion>Inaccurate time stamps make it more difficult to correlate events and can lead to an inaccurate analysis. Determining the cor...Rule Low Severity -
SRG-OS-000366-GPOS-00153
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system's Advance Package Tool (APT) must be configured to prevent the installation of patches, service packs, device drivers, or Ubuntu operating system components without verification they have been digitally signed using a certificate that is recognized and approved by the organization.
<VulnDiscussion>Changes to any software components can have significant effects on the overall security of the operating system. This require...Rule Medium Severity -
SRG-OS-000368-GPOS-00154
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must be configured to use AppArmor.
<VulnDiscussion>Control of program execution is a mechanism used to prevent execution of unauthorized programs. Some operating systems may pr...Rule Medium Severity -
SRG-OS-000383-GPOS-00166
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must be configured such that Pluggable Authentication Module (PAM) prohibits the use of cached authentications after one day.
<VulnDiscussion>If cached authentication information is out-of-date, the validity of the authentication information may be questionable.</...Rule Low Severity -
SRG-OS-000396-GPOS-00176
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must implement NIST FIPS-validated cryptography to protect classified information and for the following: To provision digital signatures, to generate cryptographic hashes, and to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
<VulnDiscussion>Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The operating ...Rule High Severity -
SRG-OS-000403-GPOS-00182
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must use DoD PKI-established certificate authorities for verification of the establishment of protected sessions.
<VulnDiscussion>Untrusted Certificate Authorities (CA) can issue certificates, but they may be issued by organizations or individuals that se...Rule Medium Severity -
SRG-OS-000420-GPOS-00186
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must configure the uncomplicated firewall to rate-limit impacted network interfaces.
<VulnDiscussion>Denial of service (DoS) is a condition when a resource is not available for legitimate users. When this occurs, the organizat...Rule Medium Severity -
SRG-OS-000433-GPOS-00192
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must implement nonexecutable data to protect its memory from unauthorized code execution.
<VulnDiscussion>Some adversaries launch attacks with the intent of executing code in nonexecutable regions of memory or in memory locations t...Rule Medium Severity -
SRG-OS-000433-GPOS-00193
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must implement address space layout randomization to protect its memory from unauthorized code execution.
<VulnDiscussion>Some adversaries launch attacks with the intent of executing code in non-executable regions of memory or in memory locations ...Rule Medium Severity -
SRG-OS-000437-GPOS-00194
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must be configured so that Advance Package Tool (APT) removes all software components after updated versions have been installed.
<VulnDiscussion>Previous versions of software components that are not removed from the information system after updates have been installed m...Rule Medium Severity -
SRG-OS-000445-GPOS-00199
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must use a file integrity tool to verify correct operation of all security functions.
<VulnDiscussion>Without verification of the security functions, security functions may not operate correctly and the failure may go unnoticed...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.