II - Mission Support Classified
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000366-GPOS-00153
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system's Advance Package Tool (APT) must be configured to prevent the installation of patches, service packs, device drivers, or Ubuntu operating system components without verification they have been digitally signed using a certificate that is recognized and approved by the organization.
<VulnDiscussion>Changes to any software components can have significant effects on the overall security of the operating system. This require...Rule Medium Severity -
SRG-OS-000368-GPOS-00154
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must be configured to use AppArmor.
<VulnDiscussion>Control of program execution is a mechanism used to prevent execution of unauthorized programs. Some operating systems may pr...Rule Medium Severity -
SRG-OS-000383-GPOS-00166
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must be configured such that Pluggable Authentication Module (PAM) prohibits the use of cached authentications after one day.
<VulnDiscussion>If cached authentication information is out-of-date, the validity of the authentication information may be questionable.</...Rule Low Severity -
SRG-OS-000396-GPOS-00176
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must implement NIST FIPS-validated cryptography to protect classified information and for the following: To provision digital signatures, to generate cryptographic hashes, and to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
<VulnDiscussion>Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The operating ...Rule High Severity -
SRG-OS-000403-GPOS-00182
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must use DoD PKI-established certificate authorities for verification of the establishment of protected sessions.
<VulnDiscussion>Untrusted Certificate Authorities (CA) can issue certificates, but they may be issued by organizations or individuals that se...Rule Medium Severity -
SRG-OS-000420-GPOS-00186
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must configure the uncomplicated firewall to rate-limit impacted network interfaces.
<VulnDiscussion>Denial of service (DoS) is a condition when a resource is not available for legitimate users. When this occurs, the organizat...Rule Medium Severity -
SRG-OS-000433-GPOS-00192
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must implement nonexecutable data to protect its memory from unauthorized code execution.
<VulnDiscussion>Some adversaries launch attacks with the intent of executing code in nonexecutable regions of memory or in memory locations t...Rule Medium Severity -
SRG-OS-000433-GPOS-00193
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must implement address space layout randomization to protect its memory from unauthorized code execution.
<VulnDiscussion>Some adversaries launch attacks with the intent of executing code in non-executable regions of memory or in memory locations ...Rule Medium Severity -
SRG-OS-000437-GPOS-00194
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must be configured so that Advance Package Tool (APT) removes all software components after updated versions have been installed.
<VulnDiscussion>Previous versions of software components that are not removed from the information system after updates have been installed m...Rule Medium Severity -
SRG-OS-000445-GPOS-00199
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must use a file integrity tool to verify correct operation of all security functions.
<VulnDiscussion>Without verification of the security functions, security functions may not operate correctly and the failure may go unnoticed...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.