Skip to content

III - Administrative Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000447-GPOS-00201

    Group
  • The Ubuntu operating system must notify designated personnel if baseline configurations are changed in an unauthorized manner. The file integrity tool must notify the System Administrator when changes to the baseline configuration or anomalies in the operation of any security functions are discovered.

    Unauthorized changes to the baseline configuration could make the system vulnerable to various attacks or allow unauthorized access to the Ubuntu operating system. Changes to Ubuntu operating syste...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The Ubuntu operating system must display the date and time of the last successful account logon upon logon.

    Configuration settings are the set of parameters that can be changed in hardware, software, or firmware components of the system that affect the security posture and/or functionality of the system....
    Rule Low Severity
  • SRG-OS-000480-GPOS-00232

    Group
  • The Ubuntu operating system must have an application firewall enabled.

    Firewalls protect computers from network attacks by blocking or limiting access to open network ports. Application firewalls limit which applications are allowed to communicate over the network.
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    Group
  • The Ubuntu operating system must have system commands set to a mode of 0755 or less permissive.

    If the Ubuntu operating system were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that ar...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    Group
  • The Ubuntu operating system must have system commands owned by root or a system account.

    If the Ubuntu operating system were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that ar...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    Group
  • The Ubuntu operating system must have system commands group-owned by root or a system account.

    If the Ubuntu operating system were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that ar...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The Ubuntu operating system must disable the x86 Ctrl-Alt-Delete key sequence if a graphical user interface is installed.

    A locally logged-on user who presses Ctrl-Alt-Delete, when at the console, can reboot the system. If accidentally pressed, as could happen in the case of a mixed OS environment, this can create the...
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The Ubuntu operating system must disable the x86 Ctrl-Alt-Delete key sequence.

    A locally logged-on user who presses Ctrl-Alt-Delete, when at the console, can reboot the system. If accidentally pressed, as could happen in the case of a mixed OS environment, this can create the...
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The Ubuntu operating system must not have accounts configured with blank or null passwords.

    If an account has an empty password, anyone could log on and run commands with the privileges of that account. Accounts with empty passwords should never be used in operational environments.
    Rule High Severity
  • SRG-OS-000480-GPOS-00227

    Group
  • The Ubuntu operating system must not allow accounts configured with blank or null passwords.

    If an account has an empty password, anyone could log on and run commands with the privileges of that account. Accounts with empty passwords should never be used in operational environments.
    Rule High Severity
  • SRG-OS-000378-GPOS-00163

    Group
  • The Ubuntu operating system must disable automatic mounting of Universal Serial Bus (USB) mass storage driver.

    Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. Peripherals include, but are not limited to, such devices as flash drive...
    Rule Medium Severity
  • SRG-OS-000481-GPOS-00481

    Group
  • The Ubuntu operating system must disable all wireless network adapters.

    Without protection of communications with wireless peripherals, confidentiality and integrity may be compromised because unprotected communications can be intercepted and either read, altered, or u...
    Rule Medium Severity
  • SRG-OS-000250-GPOS-00093

    Group
  • The Ubuntu operating system SSH server must be configured to use only FIPS-validated key exchange algorithms.

    Without cryptographic integrity protections provided by FIPS-validated cryptographic algorithms, information can be viewed and altered by unauthorized users without detection. The system will atte...
    Rule Medium Severity
  • SRG-OS-000138-GPOS-00069

    Group
  • The Ubuntu operating system must restrict access to the kernel message buffer.

    Restricting access to the kernel message buffer limits access only to root. This prevents attackers from gaining additional system information as a nonprivileged user.
    Rule Low Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules