III - Administrative Public
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000258-GPOS-00099
Group -
Ubuntu 22.04 LTS must have directories that contain system commands group-owned by "root".
Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tools is necessary to prevent unauthorized operatio...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
Group -
Ubuntu 22.04 LTS must have system commands owned by "root" or a system account.
If Ubuntu 22.04 LTS were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that are part of a...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
Group -
Ubuntu 22.04 LTS must have system commands group-owned by "root" or a system account.
If Ubuntu 22.04 LTS were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that are part of a...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
Group -
Ubuntu 22.04 LTS library directories must be owned by "root".
If the operating system were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that are part ...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
Group -
Ubuntu 22.04 LTS library directories must be group-owned by "root".
If the operating system were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that are part ...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
Group -
Ubuntu 22.04 LTS library files must be owned by "root".
If the operating system were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that are part ...Rule Medium Severity -
SRG-OS-000259-GPOS-00100
Group -
Ubuntu 22.04 LTS library files must be group-owned by "root".
If the operating system were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that are part ...Rule Medium Severity -
SRG-OS-000206-GPOS-00084
Group -
Ubuntu 22.04 LTS must configure the directories used by the system journal to be owned by "root".
Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational state or can identify the operating system or pla...Rule Medium Severity -
SRG-OS-000206-GPOS-00084
Group -
Ubuntu 22.04 LTS must configure the directories used by the system journal to be group-owned by "systemd-journal".
Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational state or can identify the operating system or pla...Rule Medium Severity -
SRG-OS-000206-GPOS-00084
Group -
Ubuntu 22.04 LTS must configure the files used by the system journal to be owned by "root".
Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational state or can identify the operating system or pla...Rule Medium Severity -
SRG-OS-000206-GPOS-00084
Group -
Ubuntu 22.04 LTS must configure the files used by the system journal to be group-owned by "systemd-journal".
Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational state or can identify the operating system or pla...Rule Medium Severity -
SRG-OS-000206-GPOS-00084
Group -
Ubuntu 22.04 LTS must be configured so that the "journalctl" command is owned by "root".
Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational state or can identify the operating system or pla...Rule Medium Severity -
SRG-OS-000206-GPOS-00084
Group -
Ubuntu 22.04 LTS must be configured so that the "journalctl" command is group-owned by "root".
Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational state or can identify the operating system or pla...Rule Medium Severity -
SRG-OS-000256-GPOS-00097
Group -
Ubuntu 22.04 LTS must configure audit tools to be owned by "root".
Protecting audit information also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tools is necessary to prevent unauthorized operatio...Rule Medium Severity -
SRG-OS-000206-GPOS-00084
Group -
Ubuntu 22.04 LTS must configure the "/var/log" directory to be owned by "root".
Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational state or can identify the operating system or pla...Rule Medium Severity -
SRG-OS-000206-GPOS-00084
Group -
Ubuntu 22.04 LTS must configure the "/var/log" directory to be group-owned by "syslog".
Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational state or can identify the operating system or pla...Rule Medium Severity -
SRG-OS-000206-GPOS-00084
Group -
Ubuntu 22.04 LTS must configure "/var/log/syslog" file to be owned by "syslog".
Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational state or can identify the operating system or pla...Rule Medium Severity -
SRG-OS-000206-GPOS-00084
Group -
Ubuntu 22.04 LTS must configure the "/var/log/syslog" file to be group-owned by "adm".
Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational state or can identify the operating system or pla...Rule Medium Severity -
SRG-OS-000205-GPOS-00083
Group -
Ubuntu 22.04 LTS must be configured so that the "journalctl" command is not accessible by unauthorized users.
Any operating system providing too much information in error messages risks compromising the data and security of the structure, and content of error messages needs to be carefully considered by th...Rule Medium Severity -
SRG-OS-000138-GPOS-00069
Group -
Ubuntu 22.04 LTS must set a sticky bit on all public directories to prevent unauthorized and unintended information transferred via shared system resources.
Preventing unauthorized information transfers mitigates the risk of information, including encrypted representations of information, produced by the actions of prior users/roles (or the actions of ...Rule Medium Severity -
SRG-OS-000297-GPOS-00115
Group -
Ubuntu 22.04 LTS must have an application firewall installed in order to control remote access methods.
Remote access services, such as those providing remote access to network devices and information systems, which lack automated control capabilities, increase risk and make remote user access manage...Rule Medium Severity -
SRG-OS-000297-GPOS-00115
Group -
Ubuntu 22.04 LTS must enable and run the Uncomplicated Firewall (ufw).
Remote access services, such as those providing remote access to network devices and information systems, which lack automated control capabilities, increase risk and make remote user access manage...Rule Medium Severity -
SRG-OS-000480-GPOS-00232
Group -
Ubuntu 22.04 LTS must have an application firewall enabled.
Firewalls protect computers from network attacks by blocking or limiting access to open network ports. Application firewalls limit which applications are allowed to communicate over the network.Rule Medium Severity -
SRG-OS-000420-GPOS-00186
Group -
Ubuntu 22.04 LTS must configure the Uncomplicated Firewall (ufw) to rate-limit impacted network interfaces.
Denial of service (DoS) is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot accomplish its mission or must operate at degraded cap...Rule Medium Severity -
SRG-OS-000096-GPOS-00050
Group -
Ubuntu 22.04 LTS must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.
To prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embedding of data types within data types), organizations must disable or restr...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.