Skip to content

III - Administrative Public

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000472-GPOS-00217

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS must generate audit records for the /var/log/btmp file.

    &lt;VulnDiscussion&gt;Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...
    Rule Medium Severity
  • SRG-OS-000472-GPOS-00217

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS must generate audit records for the /var/log/wtmp file.

    &lt;VulnDiscussion&gt;Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...
    Rule Medium Severity
  • SRG-OS-000472-GPOS-00217

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS must generate audit records for the /var/run/utmp file.

    &lt;VulnDiscussion&gt;Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...
    Rule Medium Severity
  • SRG-OS-000064-GPOS-00033

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS must generate audit records for the use and modification of faillog file.

    &lt;VulnDiscussion&gt;Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...
    Rule Medium Severity
  • SRG-OS-000064-GPOS-00033

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS must generate audit records for the use and modification of the lastlog file.

    &lt;VulnDiscussion&gt;Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...
    Rule Medium Severity
  • SRG-OS-000466-GPOS-00210

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS must generate audit records when successful/unsuccessful attempts to modify the /etc/sudoers file occur.

    &lt;VulnDiscussion&gt;Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...
    Rule Medium Severity
  • SRG-OS-000466-GPOS-00210

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS must generate audit records when successful/unsuccessful attempts to modify the /etc/sudoers.d directory occur.

    &lt;VulnDiscussion&gt;Without generating audit records specific to the security and mission needs of the organization, it would be difficult to est...
    Rule Medium Severity
  • SRG-OS-000326-GPOS-00126

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS must prevent all software from executing at higher privilege levels than users executing the software and the audit system must be configured to audit the execution of privileged functions.

    &lt;VulnDiscussion&gt;In certain situations, software applications/programs need to execute with elevated privileges to perform required functions....
    Rule Medium Severity
  • SRG-OS-000392-GPOS-00172

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS must generate audit records for privileged activities, nonlocal maintenance, diagnostic sessions and other system-level access.

    &lt;VulnDiscussion&gt;If events associated with nonlocal administrative access or diagnostic sessions are not logged, a major tool for assessing an...
    Rule Medium Severity
  • SRG-OS-000396-GPOS-00176

    <GroupDescription></GroupDescription>
    Group
  • Ubuntu 22.04 LTS must implement NIST FIPS-validated cryptography to protect classified information and for the following: To provision digital signatures, to generate cryptographic hashes, and to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.

    &lt;VulnDiscussion&gt;Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The operating ...
    Rule High Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules