Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000075-GPOS-00043

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS must enforce 24 hours/one day as the minimum password lifetime. Passwords for new users must have a 24 hours/one day minimum password lifetime restriction.

    &lt;VulnDiscussion&gt;Enforcing a minimum password lifetime helps to prevent repeated password changes to defeat the password reuse or history enfo...
    Rule Medium Severity
  • SRG-OS-000076-GPOS-00044

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS must enforce a 60-day maximum password lifetime restriction. Passwords for new users must have a 60-day maximum password lifetime restriction.

    &lt;VulnDiscussion&gt;Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed periodically. If the ...
    Rule Medium Severity
  • SRG-OS-000118-GPOS-00060

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS must disable account identifiers (individuals, groups, roles, and devices) after 35 days of inactivity.

    &lt;VulnDiscussion&gt;Inactive identifiers pose a risk to systems and applications because attackers may exploit an inactive identifier and potenti...
    Rule Medium Severity
  • SRG-OS-000002-GPOS-00002

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS must automatically expire temporary accounts within 72 hours.

    &lt;VulnDiscussion&gt;Temporary accounts are privileged or nonprivileged accounts established during pressing circumstances, such as new software o...
    Rule Medium Severity
  • SRG-OS-000021-GPOS-00005

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS must automatically lock an account until the locked account is released by an administrator when three unsuccessful logon attempts have been made.

    &lt;VulnDiscussion&gt;By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise...
    Rule Low Severity
  • SRG-OS-000480-GPOS-00226

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS must enforce a delay of at least four seconds between logon prompts following a failed logon attempt.

    &lt;VulnDiscussion&gt;Limiting the number of logon attempts over a certain time interval reduces the chances that an unauthorized user may gain acc...
    Rule Low Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS must display the date and time of the last successful account logon upon logon.

    &lt;VulnDiscussion&gt;Configuration settings are the set of parameters that can be changed in hardware, software, or firmware components of the sys...
    Rule Low Severity
  • SRG-OS-000027-GPOS-00008

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS must limit the number of concurrent sessions to ten for all accounts and/or account types.

    &lt;VulnDiscussion&gt;Ubuntu 22.04 LTS management includes the ability to control the number of users and user sessions that utilize an operating s...
    Rule Low Severity
  • SRG-OS-000030-GPOS-00011

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS must allow users to directly initiate a session lock for all connection types.

    &lt;VulnDiscussion&gt;A session lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the ...
    Rule Medium Severity
  • SRG-OS-000279-GPOS-00109

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS must automatically exit interactive command shell user sessions after 15 minutes of inactivity.

    &lt;VulnDiscussion&gt;Terminating an idle interactive command shell user session within a short time period reduces the window of opportunity for u...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00228

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS default filesystem permissions must be defined in such a way that all authenticated users can read and modify only their own files.

    &lt;VulnDiscussion&gt;Setting the most restrictive default permissions ensures newly created accounts do not have unnecessary access.&lt;/VulnDiscu...
    Rule Medium Severity
  • SRG-OS-000312-GPOS-00124

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS must have the "apparmor" package installed.

    &lt;VulnDiscussion&gt;Control of program execution is a mechanism used to prevent execution of unauthorized programs. Some operating systems may pr...
    Rule Medium Severity
  • SRG-OS-000368-GPOS-00154

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS must be configured to use AppArmor.

    &lt;VulnDiscussion&gt;Control of program execution is a mechanism used to prevent execution of unauthorized programs. Some operating systems may pr...
    Rule Medium Severity
  • SRG-OS-000373-GPOS-00156

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS must require users to reauthenticate for privilege escalation or when changing roles.

    &lt;VulnDiscussion&gt;Without reauthentication, users may access resources or perform tasks for which they do not have authorization. When op...
    Rule Medium Severity
  • SRG-OS-000134-GPOS-00068

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS must ensure only users who need access to security functions are part of sudo group.

    &lt;VulnDiscussion&gt;An isolation boundary provides access control and protects the integrity of the hardware, software, and firmware that perform...
    Rule High Severity
  • SRG-OS-000069-GPOS-00037

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS must enforce password complexity by requiring at least one uppercase character be used.

    &lt;VulnDiscussion&gt;Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...
    Rule Medium Severity
  • SRG-OS-000070-GPOS-00038

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS must enforce password complexity by requiring at least one lowercase character be used.

    &lt;VulnDiscussion&gt;Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...
    Rule Medium Severity
  • SRG-OS-000071-GPOS-00039

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS must enforce password complexity by requiring that at least one numeric character be used.

    &lt;VulnDiscussion&gt;Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...
    Rule Medium Severity
  • SRG-OS-000266-GPOS-00101

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS must enforce password complexity by requiring that at least one special character be used.

    &lt;VulnDiscussion&gt;Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity o...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00225

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS must prevent the use of dictionary words for passwords.

    &lt;VulnDiscussion&gt;If Ubuntu 22.04 LTS allows the user to select passwords based on dictionary words, then this increases the chances of passwor...
    Rule Medium Severity
  • SRG-OS-000078-GPOS-00046

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS must enforce a minimum 15-character password length.

    &lt;VulnDiscussion&gt;The shorter the password, the lower the number of possible combinations that need to be tested before the password is comprom...
    Rule Medium Severity
  • SRG-OS-000072-GPOS-00040

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS must require the change of at least eight characters when passwords are changed.

    &lt;VulnDiscussion&gt;If the operating system allows the user to consecutively reuse extensive portions of passwords, this increases the chances of...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00225

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS must be configured so that when passwords are changed or new passwords are established, pwquality must be used.

    &lt;VulnDiscussion&gt;Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...
    Rule Medium Severity
  • SRG-OS-000073-GPOS-00041

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS must store only encrypted representations of passwords.

    &lt;VulnDiscussion&gt;Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS must not allow accounts configured with blank or null passwords.

    &lt;VulnDiscussion&gt;If an account has an empty password, anyone could log on and run commands with the privileges of that account. Accounts with ...
    Rule High Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules