CIS Ubuntu Linux 18.04 LTS v2.2.0 L1 Workstation

Audit Details

Name: CIS Ubuntu Linux 18.04 LTS v2.2.0 L1 Workstation

Updated: 12/20/2024

Authority: CIS

Plugin: Unix

Revision: 1.5

Estimated Item Count: 222

File Details

Filename: CIS_Ubuntu_Linux_18.04_LTS_v2.2.0_L1_Workstation.audit

Size: 893 kB

MD5: de4305fc83f0d2007a427cbf46a6af06
SHA256: 59ffc30aab1cdb9d9fd153af133e1836b30bc412475c2df414c93c0c1bcae14c

Audit Changelog

 
Revision 1.5

Dec 20, 2024

Functional Update
  • 1.2.1 Ensure AIDE is installed
  • 1.3.1 Ensure updates, patches, and additional security software are installed
  • 1.3.2 Ensure package manager repositories are configured
  • 1.3.3 Ensure GPG keys are configured
  • 1.5.4 Ensure prelink is not installed
  • 1.5.5 Ensure Automatic Error Reporting is not enabled
  • 1.6.1.1 Ensure AppArmor is installed
  • 1.6.1.3 Ensure all AppArmor Profiles are in enforce or complain mode
  • 1.7.2 Ensure local login warning banner is configured properly
  • 1.7.3 Ensure remote login warning banner is configured properly
  • 1.8.10 Ensure XDCMP is not enabled
  • 1.8.4 Ensure GDM screen locks when the user is idle
  • 2.1.2.2 Ensure chrony is running as user _chrony
  • 2.1.2.3 Ensure chrony is enabled and running
  • 2.1.3.2 Ensure systemd-timesyncd is enabled and running
  • 2.1.4.1 Ensure ntp access control is configured
  • 2.1.4.2 Ensure ntp is configured with authorized timeserver
  • 2.1.4.3 Ensure ntp is running as user ntp
  • 2.1.4.4 Ensure ntp is enabled and running
  • 2.2.10 Ensure IMAP and POP3 server are not installed
  • 2.2.11 Ensure Samba is not installed
  • 2.2.12 Ensure HTTP Proxy Server is not installed
  • 2.2.13 Ensure SNMP Server is not installed
  • 2.2.14 Ensure NIS Server is not installed
  • 2.2.15 Ensure dnsmasq is not installed
  • 2.2.17 Ensure rsync service is either not installed or is masked
  • 2.2.2 Ensure Avahi Server is not installed
  • 2.2.4 Ensure DHCP Server is not installed
  • 2.2.5 Ensure LDAP server is not installed
  • 2.2.6 Ensure NFS is not installed
  • 2.2.7 Ensure DNS Server is not installed
  • 2.2.8 Ensure FTP Server is not installed
  • 2.2.9 Ensure HTTP server is not installed
  • 2.3.1 Ensure NIS Client is not installed
  • 2.3.2 Ensure rsh client is not installed
  • 2.3.3 Ensure talk client is not installed
  • 2.3.4 Ensure telnet client is not installed
  • 2.3.5 Ensure LDAP client is not installed
  • 2.3.6 Ensure RPC is not installed
  • 3.4.1.1 Ensure ufw is installed
  • 3.4.1.2 Ensure iptables-persistent is not installed with ufw
  • 3.4.1.3 Ensure ufw service is enabled
  • 3.4.1.4 Ensure ufw loopback traffic is configured
  • 3.4.1.5 Ensure ufw outbound connections are configured
  • 3.4.1.6 Ensure ufw firewall rules exist for all open ports
  • 3.4.1.7 Ensure ufw default deny firewall policy
  • 3.4.2.1 Ensure nftables is installed
  • 3.4.2.2 Ensure ufw is uninstalled or disabled with nftables
  • 3.4.2.4 Ensure a nftables table exists
  • 3.4.2.5 Ensure nftables base chains exist
  • 3.4.2.6 Ensure nftables loopback traffic is configured
  • 3.4.2.7 Ensure nftables outbound and established connections are configured
  • 3.4.2.8 Ensure nftables default deny firewall policy
  • 3.4.3.1.1 Ensure iptables packages are installed
  • 3.4.3.1.2 Ensure nftables is not installed with iptables
  • 3.4.3.1.3 Ensure ufw is uninstalled or disabled with iptables
  • 3.4.3.2.1 Ensure iptables default deny firewall policy
  • 3.4.3.2.2 Ensure iptables loopback traffic is configured
  • 3.4.3.2.3 Ensure iptables outbound and established connections are configured
  • 3.4.3.2.4 Ensure iptables firewall rules exist for all open ports
  • 3.4.3.3.1 Ensure ip6tables default deny firewall policy
  • 3.4.3.3.2 Ensure ip6tables loopback traffic is configured
  • 3.4.3.3.3 Ensure ip6tables outbound and established connections are configured
  • 3.4.3.3.4 Ensure ip6tables firewall rules exist for all open ports
  • 4.2.10 Ensure sshd IgnoreRhosts is enabled
  • 4.2.11 Ensure sshd KexAlgorithms is configured
  • 4.2.12 Ensure sshd LoginGraceTime is configured
  • 4.2.14 Ensure sshd MACs are configured
  • 4.2.15 Ensure sshd MaxAuthTries is configured
  • 4.2.16 Ensure sshd MaxSessions is configured
  • 4.2.17 Ensure sshd MaxStartups is configured
  • 4.2.18 Ensure sshd PermitEmptyPasswords is disabled
  • 4.2.19 Ensure sshd PermitRootLogin is disabled
  • 4.2.20 Ensure sshd PermitUserEnvironment is disabled
  • 4.2.21 Ensure sshd UsePAM is enabled
  • 4.2.3 Ensure sshd access is configured
  • 4.2.4 Ensure sshd Banner is configured
  • 4.2.5 Ensure sshd Ciphers are configured
  • 4.2.6 Ensure sshd ClientAliveInterval and ClientAliveCountMax are configured
  • 4.2.7 Ensure sshd DisableForwarding is enabled
  • 4.2.8 Ensure sshd GSSAPIAuthentication is disabled
  • 4.2.9 Ensure sshd HostbasedAuthentication is disabled
  • 4.3.2 Ensure sudo commands use pty
  • 4.3.6 Ensure sudo authentication timeout is configured correctly
  • 4.3.7 Ensure access to the su command is restricted
  • 4.4.5 Ensure all current passwords uses the configured hashing algorithm
  • 4.5.1.4 Ensure inactive password lock is 30 days or less
  • 4.5.1.5 Ensure all users last password change date is in the past
  • 5.1.1.1.1 Ensure systemd-journal-remote is installed
  • 5.1.1.1.2 Ensure systemd-journal-remote is configured
  • 5.1.1.1.3 Ensure systemd-journal-remote is enabled
  • 5.1.1.1.4 Ensure journald is not configured to receive logs from a remote client
  • 5.1.1.2 Ensure journald service is enabled
  • 5.1.1.3 Ensure journald is configured to compress large log files
  • 5.1.1.4 Ensure journald is configured to write logfiles to persistent disk
  • 5.1.1.5 Ensure journald is not configured to send logs to rsyslog
  • 5.1.1.6 Ensure journald log rotation is configured per site policy
  • 5.1.1.7 Ensure journald default file permissions configured
  • 5.1.2.1 Ensure rsyslog is installed
  • 5.1.2.2 Ensure rsyslog service is enabled
  • 5.1.2.3 Ensure journald is configured to send logs to rsyslog
  • 5.1.2.4 Ensure rsyslog default file permissions are configured
  • 5.1.2.5 Ensure logging is configured
  • 5.1.2.6 Ensure rsyslog is configured to send logs to a remote log host
  • 5.1.2.7 Ensure rsyslog is not configured to receive logs from a remote client
  • 6.2.1 Ensure accounts in /etc/passwd use shadowed passwords
  • 6.2.2 Ensure /etc/shadow password fields are not empty
  • 6.2.4 Ensure shadow group is empty
Miscellaneous
  • References updated.
Revision 1.4

Nov 6, 2024

Functional Update
  • 6.1.10 Ensure world writable files and directories are secured
  • 6.1.11 Ensure no files or directories without an owner and a group exist
  • 6.1.12 Ensure SUID and SGID files are reviewed
Revision 1.3

Aug 26, 2024

Functional Update
  • 1.4.3 Ensure authentication required for single user mode
Miscellaneous
  • References updated.
Revision 1.2

Jul 31, 2024

Miscellaneous
  • Variables updated.
Revision 1.1

Jun 17, 2024

Miscellaneous
  • Metadata updated.
  • References updated.