III - Administrative Public
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000424-GPOS-00188
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must configure the SSH daemon to use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hashes to prevent the unauthorized disclosure of information and/or detect changes to information during transmission.
<VulnDiscussion>Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote acc...Rule Medium Severity -
SRG-OS-000424-GPOS-00188
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must configure the SSH daemon to use FIPS 140-2 approved ciphers to prevent the unauthorized disclosure of information and/or detect changes to information during transmission.
<VulnDiscussion>Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote acc...Rule Medium Severity -
SRG-OS-000480-GPOS-00229
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must not allow unattended or automatic login via SSH.
<VulnDiscussion>Failure to restrict system access to authenticated users negatively impacts Ubuntu operating system security.</VulnDiscuss...Rule High Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must be configured so that remote X connections are disabled, unless to fulfill documented and validated mission requirements.
<VulnDiscussion>The security risk of using X11 forwarding is that the client's X11 display server may be exposed to attack when the SSH clien...Rule High Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system SSH daemon must prevent remote hosts from connecting to the proxy display.
<VulnDiscussion>When X11 forwarding is enabled, there may be additional exposure to the server and client displays if the sshd proxy display ...Rule Medium Severity -
SRG-OS-000069-GPOS-00037
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must enforce password complexity by requiring that at least one upper-case character be used.
<VulnDiscussion>Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...Rule Low Severity -
SRG-OS-000070-GPOS-00038
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must enforce password complexity by requiring that at least one lower-case character be used.
<VulnDiscussion>Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...Rule Low Severity -
SRG-OS-000071-GPOS-00039
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must enforce password complexity by requiring that at least one numeric character be used.
<VulnDiscussion>Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...Rule Low Severity -
SRG-OS-000072-GPOS-00040
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must require the change of at least 8 characters when passwords are changed.
<VulnDiscussion> If the operating system allows the user to consecutively reuse extensive portions of passwords, this increases the chances o...Rule Low Severity -
SRG-OS-000078-GPOS-00046
<GroupDescription></GroupDescription>Group -
The Ubuntu operating system must enforce a minimum 15-character password length.
<VulnDiscussion>The shorter the password, the lower the number of possible combinations that need to be tested before the password is comprom...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.