CIS Ubuntu Linux 18.04 LTS v2.2.0 L1 Server

Audit Details

Name: CIS Ubuntu Linux 18.04 LTS v2.2.0 L1 Server

Updated: 1/6/2025

Authority: CIS

Plugin: Unix

Revision: 1.6

Estimated Item Count: 227

File Details

Filename: CIS_Ubuntu_Linux_18.04_LTS_v2.2.0_L1_Server.audit

Size: 922 kB

MD5: 97cd299085969d2201576b1bbe4dcae4
SHA256: 7c6ffedcd7de7d92efb6316cacbccc099df749071247e922ce827c19b42b13f5

Audit Changelog

 
Revision 1.6

Jan 6, 2025

Informational Update
  • 1.1.1.1 Ensure mounting of cramfs filesystems is disabled
  • 1.1.1.2 Ensure mounting of freevxfs filesystems is disabled
  • 1.1.1.3 Ensure mounting of jffs2 filesystems is disabled
  • 1.1.1.4 Ensure mounting of hfs filesystems is disabled
  • 1.1.1.5 Ensure mounting of hfsplus filesystems is disabled
  • 1.1.10 Disable USB Storage
  • 1.8.2 Ensure GDM login banner is configured
  • 1.8.5 Ensure GDM screen locks cannot be overridden
  • 1.8.6 Ensure GDM automatic mounting of removable media is disabled
  • 1.8.7 Ensure GDM disabling automatic mounting of removable media is not overridden
  • 1.8.8 Ensure GDM autorun-never is enabled
  • 1.8.9 Ensure GDM autorun-never is not overridden
  • 2.1.3.1 Ensure systemd-timesyncd configured with authorized timeserver
  • 3.1.2 Ensure wireless interfaces are disabled
  • 4.1.8 Ensure cron is restricted to authorized users
  • 4.1.9 Ensure at is restricted to authorized users
  • 4.2.2 Ensure access to SSH key files is configured
  • 4.4.5 Ensure all current passwords uses the configured hashing algorithm
  • 4.5.2 Ensure system accounts are secured
  • 5.1.3 Ensure all logfiles have appropriate access configured
  • 6.1.10 Ensure world writable files and directories are secured
  • 6.1.9 Ensure permissions on /etc/security/opasswd are configured
  • 6.2.10 Ensure local interactive user dot files access is configured
  • 6.2.9 Ensure local interactive user home directories are configured
Miscellaneous
  • Metadata updated.
Revision 1.5

Dec 20, 2024

Functional Update
  • 1.1.9 Ensure autofs is not installed or the autofs service is disabled
  • 1.2.1 Ensure AIDE is installed
  • 1.3.1 Ensure updates, patches, and additional security software are installed
  • 1.3.2 Ensure package manager repositories are configured
  • 1.3.3 Ensure GPG keys are configured
  • 1.5.4 Ensure prelink is not installed
  • 1.5.5 Ensure Automatic Error Reporting is not enabled
  • 1.6.1.1 Ensure AppArmor is installed
  • 1.6.1.3 Ensure all AppArmor Profiles are in enforce or complain mode
  • 1.7.2 Ensure local login warning banner is configured properly
  • 1.7.3 Ensure remote login warning banner is configured properly
  • 1.8.10 Ensure XDCMP is not enabled
  • 1.8.4 Ensure GDM screen locks when the user is idle
  • 2.1.2.2 Ensure chrony is running as user _chrony
  • 2.1.2.3 Ensure chrony is enabled and running
  • 2.1.3.2 Ensure systemd-timesyncd is enabled and running
  • 2.1.4.1 Ensure ntp access control is configured
  • 2.1.4.2 Ensure ntp is configured with authorized timeserver
  • 2.1.4.3 Ensure ntp is running as user ntp
  • 2.1.4.4 Ensure ntp is enabled and running
  • 2.2.10 Ensure IMAP and POP3 server are not installed
  • 2.2.11 Ensure Samba is not installed
  • 2.2.12 Ensure HTTP Proxy Server is not installed
  • 2.2.13 Ensure SNMP Server is not installed
  • 2.2.14 Ensure NIS Server is not installed
  • 2.2.15 Ensure dnsmasq is not installed
  • 2.2.17 Ensure rsync service is either not installed or is masked
  • 2.2.2 Ensure Avahi Server is not installed
  • 2.2.3 Ensure CUPS is not installed
  • 2.2.4 Ensure DHCP Server is not installed
  • 2.2.5 Ensure LDAP server is not installed
  • 2.2.6 Ensure NFS is not installed
  • 2.2.7 Ensure DNS Server is not installed
  • 2.2.8 Ensure FTP Server is not installed
  • 2.2.9 Ensure HTTP server is not installed
  • 2.3.1 Ensure NIS Client is not installed
  • 2.3.2 Ensure rsh client is not installed
  • 2.3.3 Ensure talk client is not installed
  • 2.3.4 Ensure telnet client is not installed
  • 2.3.5 Ensure LDAP client is not installed
  • 2.3.6 Ensure RPC is not installed
  • 3.1.3 Ensure bluetooth services are not in use
  • 3.4.1.1 Ensure ufw is installed
  • 3.4.1.2 Ensure iptables-persistent is not installed with ufw
  • 3.4.1.3 Ensure ufw service is enabled
  • 3.4.1.4 Ensure ufw loopback traffic is configured
  • 3.4.1.5 Ensure ufw outbound connections are configured
  • 3.4.1.6 Ensure ufw firewall rules exist for all open ports
  • 3.4.1.7 Ensure ufw default deny firewall policy
  • 3.4.2.1 Ensure nftables is installed
  • 3.4.2.2 Ensure ufw is uninstalled or disabled with nftables
  • 3.4.2.4 Ensure a nftables table exists
  • 3.4.2.5 Ensure nftables base chains exist
  • 3.4.2.6 Ensure nftables loopback traffic is configured
  • 3.4.2.7 Ensure nftables outbound and established connections are configured
  • 3.4.2.8 Ensure nftables default deny firewall policy
  • 3.4.3.1.1 Ensure iptables packages are installed
  • 3.4.3.1.2 Ensure nftables is not installed with iptables
  • 3.4.3.1.3 Ensure ufw is uninstalled or disabled with iptables
  • 3.4.3.2.1 Ensure iptables default deny firewall policy
  • 3.4.3.2.2 Ensure iptables loopback traffic is configured
  • 3.4.3.2.3 Ensure iptables outbound and established connections are configured
  • 3.4.3.2.4 Ensure iptables firewall rules exist for all open ports
  • 3.4.3.3.1 Ensure ip6tables default deny firewall policy
  • 3.4.3.3.2 Ensure ip6tables loopback traffic is configured
  • 3.4.3.3.3 Ensure ip6tables outbound and established connections are configured
  • 3.4.3.3.4 Ensure ip6tables firewall rules exist for all open ports
  • 4.2.10 Ensure sshd IgnoreRhosts is enabled
  • 4.2.11 Ensure sshd KexAlgorithms is configured
  • 4.2.12 Ensure sshd LoginGraceTime is configured
  • 4.2.14 Ensure sshd MACs are configured
  • 4.2.15 Ensure sshd MaxAuthTries is configured
  • 4.2.16 Ensure sshd MaxSessions is configured
  • 4.2.17 Ensure sshd MaxStartups is configured
  • 4.2.18 Ensure sshd PermitEmptyPasswords is disabled
  • 4.2.19 Ensure sshd PermitRootLogin is disabled
  • 4.2.20 Ensure sshd PermitUserEnvironment is disabled
  • 4.2.21 Ensure sshd UsePAM is enabled
  • 4.2.3 Ensure sshd access is configured
  • 4.2.4 Ensure sshd Banner is configured
  • 4.2.5 Ensure sshd Ciphers are configured
  • 4.2.6 Ensure sshd ClientAliveInterval and ClientAliveCountMax are configured
  • 4.2.9 Ensure sshd HostbasedAuthentication is disabled
  • 4.3.2 Ensure sudo commands use pty
  • 4.3.6 Ensure sudo authentication timeout is configured correctly
  • 4.3.7 Ensure access to the su command is restricted
  • 4.4.5 Ensure all current passwords uses the configured hashing algorithm
  • 4.5.1.4 Ensure inactive password lock is 30 days or less
  • 4.5.1.5 Ensure all users last password change date is in the past
  • 5.1.1.1.1 Ensure systemd-journal-remote is installed
  • 5.1.1.1.2 Ensure systemd-journal-remote is configured
  • 5.1.1.1.3 Ensure systemd-journal-remote is enabled
  • 5.1.1.1.4 Ensure journald is not configured to receive logs from a remote client
  • 5.1.1.2 Ensure journald service is enabled
  • 5.1.1.3 Ensure journald is configured to compress large log files
  • 5.1.1.4 Ensure journald is configured to write logfiles to persistent disk
  • 5.1.1.5 Ensure journald is not configured to send logs to rsyslog
  • 5.1.1.6 Ensure journald log rotation is configured per site policy
  • 5.1.1.7 Ensure journald default file permissions configured
  • 5.1.2.1 Ensure rsyslog is installed
  • 5.1.2.2 Ensure rsyslog service is enabled
  • 5.1.2.3 Ensure journald is configured to send logs to rsyslog
  • 5.1.2.4 Ensure rsyslog default file permissions are configured
  • 5.1.2.5 Ensure logging is configured
  • 5.1.2.6 Ensure rsyslog is configured to send logs to a remote log host
  • 5.1.2.7 Ensure rsyslog is not configured to receive logs from a remote client
  • 6.2.1 Ensure accounts in /etc/passwd use shadowed passwords
  • 6.2.2 Ensure /etc/shadow password fields are not empty
  • 6.2.4 Ensure shadow group is empty
Miscellaneous
  • References updated.
Revision 1.4

Nov 6, 2024

Functional Update
  • 6.1.10 Ensure world writable files and directories are secured
  • 6.1.11 Ensure no files or directories without an owner and a group exist
  • 6.1.12 Ensure SUID and SGID files are reviewed
Revision 1.3

Aug 26, 2024

Functional Update
  • 1.4.3 Ensure authentication required for single user mode
Miscellaneous
  • References updated.
Revision 1.2

Jul 31, 2024

Miscellaneous
  • Variables updated.
Revision 1.1

Jun 17, 2024

Miscellaneous
  • Metadata updated.
  • References updated.