Skip to content

III - Administrative Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000206-GPOS-00084

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS must configure the "/var/log" directory to be group-owned by "syslog".

    &lt;VulnDiscussion&gt;Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an orga...
    Rule Medium Severity
  • SRG-OS-000206-GPOS-00084

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS must configure "/var/log/syslog" file to be owned by "syslog".

    &lt;VulnDiscussion&gt;Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an orga...
    Rule Medium Severity
  • SRG-OS-000206-GPOS-00084

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS must configure the "/var/log/syslog" file to be group-owned by "adm".

    &lt;VulnDiscussion&gt;Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an orga...
    Rule Medium Severity
  • SRG-OS-000205-GPOS-00083

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS must be configured so that the "journalctl" command is not accessible by unauthorized users.

    &lt;VulnDiscussion&gt;Any operating system providing too much information in error messages risks compromising the data and security of the structu...
    Rule Medium Severity
  • SRG-OS-000138-GPOS-00069

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS must set a sticky bit on all public directories to prevent unauthorized and unintended information transferred via shared system resources.

    &lt;VulnDiscussion&gt;Preventing unauthorized information transfers mitigates the risk of information, including encrypted representations of infor...
    Rule Medium Severity
  • SRG-OS-000297-GPOS-00115

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS must have an application firewall installed in order to control remote access methods.

    &lt;VulnDiscussion&gt;Remote access services, such as those providing remote access to network devices and information systems, which lack automate...
    Rule Medium Severity
  • SRG-OS-000297-GPOS-00115

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS must enable and run the Uncomplicated Firewall (ufw).

    &lt;VulnDiscussion&gt;Remote access services, such as those providing remote access to network devices and information systems, which lack automate...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00232

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS must have an application firewall enabled.

    &lt;VulnDiscussion&gt;Firewalls protect computers from network attacks by blocking or limiting access to open network ports. Application firewalls ...
    Rule Medium Severity
  • SRG-OS-000420-GPOS-00186

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS must configure the Uncomplicated Firewall (ufw) to rate-limit impacted network interfaces.

    &lt;VulnDiscussion&gt;Denial of service (DoS) is a condition when a resource is not available for legitimate users. When this occurs, the organizat...
    Rule Medium Severity
  • SRG-OS-000096-GPOS-00050

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.

    &lt;VulnDiscussion&gt;To prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embeddi...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules