Skip to content

III - Administrative Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000480-GPOS-00226

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS must enforce a delay of at least four seconds between logon prompts following a failed logon attempt.

    &lt;VulnDiscussion&gt;Limiting the number of logon attempts over a certain time interval reduces the chances that an unauthorized user may gain acc...
    Rule Low Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS must display the date and time of the last successful account logon upon logon.

    &lt;VulnDiscussion&gt;Configuration settings are the set of parameters that can be changed in hardware, software, or firmware components of the sys...
    Rule Low Severity
  • SRG-OS-000027-GPOS-00008

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS must limit the number of concurrent sessions to ten for all accounts and/or account types.

    &lt;VulnDiscussion&gt;Ubuntu 22.04 LTS management includes the ability to control the number of users and user sessions that utilize an operating s...
    Rule Low Severity
  • SRG-OS-000030-GPOS-00011

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS must allow users to directly initiate a session lock for all connection types.

    &lt;VulnDiscussion&gt;A session lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity of the ...
    Rule Medium Severity
  • SRG-OS-000279-GPOS-00109

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS must automatically exit interactive command shell user sessions after 15 minutes of inactivity.

    &lt;VulnDiscussion&gt;Terminating an idle interactive command shell user session within a short time period reduces the window of opportunity for u...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00228

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS default filesystem permissions must be defined in such a way that all authenticated users can read and modify only their own files.

    &lt;VulnDiscussion&gt;Setting the most restrictive default permissions ensures newly created accounts do not have unnecessary access.&lt;/VulnDiscu...
    Rule Medium Severity
  • SRG-OS-000312-GPOS-00124

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS must have the "apparmor" package installed.

    &lt;VulnDiscussion&gt;Control of program execution is a mechanism used to prevent execution of unauthorized programs. Some operating systems may pr...
    Rule Medium Severity
  • SRG-OS-000368-GPOS-00154

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS must be configured to use AppArmor.

    &lt;VulnDiscussion&gt;Control of program execution is a mechanism used to prevent execution of unauthorized programs. Some operating systems may pr...
    Rule Medium Severity
  • SRG-OS-000373-GPOS-00156

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS must require users to reauthenticate for privilege escalation or when changing roles.

    &lt;VulnDiscussion&gt;Without reauthentication, users may access resources or perform tasks for which they do not have authorization. When op...
    Rule Medium Severity
  • SRG-OS-000134-GPOS-00068

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS must ensure only users who need access to security functions are part of sudo group.

    &lt;VulnDiscussion&gt;An isolation boundary provides access control and protects the integrity of the hardware, software, and firmware that perform...
    Rule High Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules