Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000205-GPOS-00083

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS must generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.

    &lt;VulnDiscussion&gt;Any operating system providing too much information in error messages risks compromising the data and security of the structu...
    Rule Medium Severity
  • SRG-OS-000205-GPOS-00083

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS must generate system journal entries without revealing information that could be exploited by adversaries.

    &lt;VulnDiscussion&gt;Any operating system providing too much information in error messages risks compromising the data and security of the structu...
    Rule Medium Severity
  • SRG-OS-000206-GPOS-00084

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS must configure "/var/log/syslog" file with mode "640" or less permissive.

    &lt;VulnDiscussion&gt;Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an orga...
    Rule Medium Severity
  • SRG-OS-000256-GPOS-00097

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS must configure audit tools with a mode of "755" or less permissive.

    &lt;VulnDiscussion&gt;Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefo...
    Rule Medium Severity
  • SRG-OS-000258-GPOS-00099

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS must have directories that contain system commands owned by "root".

    &lt;VulnDiscussion&gt;Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefo...
    Rule Medium Severity
  • SRG-OS-000258-GPOS-00099

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS must have directories that contain system commands group-owned by "root".

    &lt;VulnDiscussion&gt;Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefo...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS must have system commands owned by "root" or a system account.

    &lt;VulnDiscussion&gt;If Ubuntu 22.04 LTS were to allow any user to make changes to software libraries, then those changes might be implemented wit...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS must have system commands group-owned by "root" or a system account.

    &lt;VulnDiscussion&gt;If Ubuntu 22.04 LTS were to allow any user to make changes to software libraries, then those changes might be implemented wit...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS library directories must be owned by "root".

    &lt;VulnDiscussion&gt;If the operating system were to allow any user to make changes to software libraries, then those changes might be implemented...
    Rule Medium Severity
  • SRG-OS-000259-GPOS-00100

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS library directories must be group-owned by "root".

    &lt;VulnDiscussion&gt;If the operating system were to allow any user to make changes to software libraries, then those changes might be implemented...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules