Audits
Settings
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Theme
Light
Dark
Auto
Help
Plugins
Overview
Plugins Pipeline
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Release Notes
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Settings
Theme
Light
Dark
Auto
Detections
Plugins
Overview
Plugins Pipeline
Release Notes
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
Analytics
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Audits
CIS Ubuntu Linux 18.04 LTS v2.2.0 L1 Workstation
Changelog
Revision 1.5
Changelog
Revision 1.5
Dec 20, 2024
Functional Update
1.2.1 Ensure AIDE is installed
1.3.1 Ensure updates, patches, and additional security software are installed
1.3.2 Ensure package manager repositories are configured
1.3.3 Ensure GPG keys are configured
1.5.4 Ensure prelink is not installed
1.5.5 Ensure Automatic Error Reporting is not enabled
1.6.1.1 Ensure AppArmor is installed
1.6.1.3 Ensure all AppArmor Profiles are in enforce or complain mode
1.7.2 Ensure local login warning banner is configured properly
1.7.3 Ensure remote login warning banner is configured properly
1.8.10 Ensure XDCMP is not enabled
1.8.4 Ensure GDM screen locks when the user is idle
2.1.2.2 Ensure chrony is running as user _chrony
2.1.2.3 Ensure chrony is enabled and running
2.1.3.2 Ensure systemd-timesyncd is enabled and running
2.1.4.1 Ensure ntp access control is configured
2.1.4.2 Ensure ntp is configured with authorized timeserver
2.1.4.3 Ensure ntp is running as user ntp
2.1.4.4 Ensure ntp is enabled and running
2.2.10 Ensure IMAP and POP3 server are not installed
2.2.11 Ensure Samba is not installed
2.2.12 Ensure HTTP Proxy Server is not installed
2.2.13 Ensure SNMP Server is not installed
2.2.14 Ensure NIS Server is not installed
2.2.15 Ensure dnsmasq is not installed
2.2.17 Ensure rsync service is either not installed or is masked
2.2.2 Ensure Avahi Server is not installed
2.2.4 Ensure DHCP Server is not installed
2.2.5 Ensure LDAP server is not installed
2.2.6 Ensure NFS is not installed
2.2.7 Ensure DNS Server is not installed
2.2.8 Ensure FTP Server is not installed
2.2.9 Ensure HTTP server is not installed
2.3.1 Ensure NIS Client is not installed
2.3.2 Ensure rsh client is not installed
2.3.3 Ensure talk client is not installed
2.3.4 Ensure telnet client is not installed
2.3.5 Ensure LDAP client is not installed
2.3.6 Ensure RPC is not installed
3.4.1.1 Ensure ufw is installed
3.4.1.2 Ensure iptables-persistent is not installed with ufw
3.4.1.3 Ensure ufw service is enabled
3.4.1.4 Ensure ufw loopback traffic is configured
3.4.1.5 Ensure ufw outbound connections are configured
3.4.1.6 Ensure ufw firewall rules exist for all open ports
3.4.1.7 Ensure ufw default deny firewall policy
3.4.2.1 Ensure nftables is installed
3.4.2.2 Ensure ufw is uninstalled or disabled with nftables
3.4.2.4 Ensure a nftables table exists
3.4.2.5 Ensure nftables base chains exist
3.4.2.6 Ensure nftables loopback traffic is configured
3.4.2.7 Ensure nftables outbound and established connections are configured
3.4.2.8 Ensure nftables default deny firewall policy
3.4.3.1.1 Ensure iptables packages are installed
3.4.3.1.2 Ensure nftables is not installed with iptables
3.4.3.1.3 Ensure ufw is uninstalled or disabled with iptables
3.4.3.2.1 Ensure iptables default deny firewall policy
3.4.3.2.2 Ensure iptables loopback traffic is configured
3.4.3.2.3 Ensure iptables outbound and established connections are configured
3.4.3.2.4 Ensure iptables firewall rules exist for all open ports
3.4.3.3.1 Ensure ip6tables default deny firewall policy
3.4.3.3.2 Ensure ip6tables loopback traffic is configured
3.4.3.3.3 Ensure ip6tables outbound and established connections are configured
3.4.3.3.4 Ensure ip6tables firewall rules exist for all open ports
4.2.10 Ensure sshd IgnoreRhosts is enabled
4.2.11 Ensure sshd KexAlgorithms is configured
4.2.12 Ensure sshd LoginGraceTime is configured
4.2.14 Ensure sshd MACs are configured
4.2.15 Ensure sshd MaxAuthTries is configured
4.2.16 Ensure sshd MaxSessions is configured
4.2.17 Ensure sshd MaxStartups is configured
4.2.18 Ensure sshd PermitEmptyPasswords is disabled
4.2.19 Ensure sshd PermitRootLogin is disabled
4.2.20 Ensure sshd PermitUserEnvironment is disabled
4.2.21 Ensure sshd UsePAM is enabled
4.2.3 Ensure sshd access is configured
4.2.4 Ensure sshd Banner is configured
4.2.5 Ensure sshd Ciphers are configured
4.2.6 Ensure sshd ClientAliveInterval and ClientAliveCountMax are configured
4.2.7 Ensure sshd DisableForwarding is enabled
4.2.8 Ensure sshd GSSAPIAuthentication is disabled
4.2.9 Ensure sshd HostbasedAuthentication is disabled
4.3.2 Ensure sudo commands use pty
4.3.6 Ensure sudo authentication timeout is configured correctly
4.3.7 Ensure access to the su command is restricted
4.4.5 Ensure all current passwords uses the configured hashing algorithm
4.5.1.4 Ensure inactive password lock is 30 days or less
4.5.1.5 Ensure all users last password change date is in the past
5.1.1.1.1 Ensure systemd-journal-remote is installed
5.1.1.1.2 Ensure systemd-journal-remote is configured
5.1.1.1.3 Ensure systemd-journal-remote is enabled
5.1.1.1.4 Ensure journald is not configured to receive logs from a remote client
5.1.1.2 Ensure journald service is enabled
5.1.1.3 Ensure journald is configured to compress large log files
5.1.1.4 Ensure journald is configured to write logfiles to persistent disk
5.1.1.5 Ensure journald is not configured to send logs to rsyslog
5.1.1.6 Ensure journald log rotation is configured per site policy
5.1.1.7 Ensure journald default file permissions configured
5.1.2.1 Ensure rsyslog is installed
5.1.2.2 Ensure rsyslog service is enabled
5.1.2.3 Ensure journald is configured to send logs to rsyslog
5.1.2.4 Ensure rsyslog default file permissions are configured
5.1.2.5 Ensure logging is configured
5.1.2.6 Ensure rsyslog is configured to send logs to a remote log host
5.1.2.7 Ensure rsyslog is not configured to receive logs from a remote client
6.2.1 Ensure accounts in /etc/passwd use shadowed passwords
6.2.2 Ensure /etc/shadow password fields are not empty
6.2.4 Ensure shadow group is empty
Miscellaneous
References updated.