DISA STIG Ubuntu 18.04 LTS v2r13

Audit Details

Name: DISA STIG Ubuntu 18.04 LTS v2r13

Updated: 3/20/2024

Authority: DISA STIG

Plugin: Unix

Revision: 1.0

Estimated Item Count: 176

File Details

Filename: DISA_STIG_Ubuntu_18.04_LTS_v2r13.audit

Size: 566 kB

MD5: c93629bfd2149c8dcb96f2ebdf5a9d3c
SHA256: 4433ea7299f4fd0c92a769ed4746d683125886fbfa5fcc9b0ec17a8d90644125

Audit Items

DescriptionCategories
DISA_STIG_Ubuntu_18.04_LTS_v2r13.audit from DISA Canonical Ubuntu 18.04 LTS v2r13 STIG
UBTU-18-010000 - Ubuntu operating systems booted with a BIOS must require authentication upon booting into single-user and maintenance modes.

ACCESS CONTROL

UBTU-18-010001 - Ubuntu operating systems booted with United Extensible Firmware Interface (UEFI) implemented must require authentication upon booting into single-user mode and maintenance.

ACCESS CONTROL

UBTU-18-010002 - The Ubuntu operating system must initiate session audits at system startup.

AUDIT AND ACCOUNTABILITY

UBTU-18-010003 - Ubuntu operating systems handling data requiring data at rest protections must employ cryptographic mechanisms to prevent unauthorized disclosure and modification of the information at rest.

SYSTEM AND COMMUNICATIONS PROTECTION

UBTU-18-010005 - The Ubuntu operating system must implement NIST FIPS-validated cryptography to protect classified information and for the following: to provision digital signatures, to generate cryptographic hashes, and to protect unclassified information requiring confidentiality and cryptographic protection in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.

SYSTEM AND COMMUNICATIONS PROTECTION

UBTU-18-010006 - The Ubuntu operating system must immediately notify the SA and ISSO (at a minimum) when allocated audit record storage volume reaches 75% of the repository maximum audit record storage capacity.

AUDIT AND ACCOUNTABILITY

UBTU-18-010007 - The Ubuntu operating system audit event multiplexor must be configured to off-load audit logs onto a different system in real time, if the system is interconnected.

AUDIT AND ACCOUNTABILITY

UBTU-18-010008 - The Ubuntu operating system must have a crontab script running weekly to off-load audit events of standalone systems.

AUDIT AND ACCOUNTABILITY

UBTU-18-010016 - Advance package Tool (APT) must be configured to prevent the installation of patches, service packs, device drivers, or Ubuntu operating system components without verification they have been digitally signed using a certificate that is recognized and approved by the organization.

CONFIGURATION MANAGEMENT

UBTU-18-010017 - The Ubuntu operating system must be configured so that Advance package Tool (APT) removes all software components after updated versions have been installed.

SYSTEM AND INFORMATION INTEGRITY

UBTU-18-010018 - The Ubuntu operating system must not have the Network Information Service (NIS) package installed.

CONFIGURATION MANAGEMENT

UBTU-18-010019 - The Ubuntu operating system must not have the rsh-server package installed.

CONFIGURATION MANAGEMENT

UBTU-18-010021 - The Ubuntu operating system must deploy Endpoint Security for Linux Threat Prevention (ENSLTP).

SYSTEM AND INFORMATION INTEGRITY

UBTU-18-010022 - The Ubuntu operating system must be configured to preserve log records from failure events.

SYSTEM AND COMMUNICATIONS PROTECTION

UBTU-18-010023 - The Ubuntu operating system must have an application firewall installed in order to control remote access methods.

ACCESS CONTROL

UBTU-18-010025 - The Ubuntu operating system audit event multiplexor must be configured to off-load audit logs onto a different system or storage media from the system being audited.

AUDIT AND ACCOUNTABILITY

UBTU-18-010030 - The Ubuntu operating system must be configured such that Pluggable Authentication Module (PAM) prohibits the use of cached authentications after one day.

IDENTIFICATION AND AUTHENTICATION

UBTU-18-010031 - The Ubuntu operating system must enforce a delay of at least 4 seconds between logon prompts following a failed logon attempt.

CONFIGURATION MANAGEMENT

UBTU-18-010032 - The Ubuntu operating system must display the date and time of the last successful account logon upon logon.

ACCESS CONTROL

UBTU-18-010033 - The Ubuntu operating system must be configured so that three consecutive invalid logon attempts by a user automatically locks the account until released by an administrator.

ACCESS CONTROL

UBTU-18-010035 - The Ubuntu operating system must display the Standard Mandatory DoD Notice and Consent Banner before granting local access to the system via a graphical user logon.

ACCESS CONTROL

UBTU-18-010036 - The Ubuntu operating system must prevent direct login into the root account.

IDENTIFICATION AND AUTHENTICATION

UBTU-18-010037 - The Ubuntu operating system must be configured so that only users who need access to security functions are part of the sudo group.

SYSTEM AND COMMUNICATIONS PROTECTION

UBTU-18-010038 - The Ubuntu operating system must display the Standard Mandatory DoD Notice and Consent Banner before granting any publically accessible connection to the system.

ACCESS CONTROL

UBTU-18-010100 - The Ubuntu operating system must enforce password complexity by requiring that at least one upper-case character be used.

IDENTIFICATION AND AUTHENTICATION

UBTU-18-010101 - The Ubuntu operating system must enforce password complexity by requiring that at least one lower-case character be used.

IDENTIFICATION AND AUTHENTICATION

UBTU-18-010102 - The Ubuntu operating system must enforce password complexity by requiring that at least one numeric character be used.

IDENTIFICATION AND AUTHENTICATION

UBTU-18-010103 - The Ubuntu operating system must require the change of at least 8 characters when passwords are changed.

IDENTIFICATION AND AUTHENTICATION

UBTU-18-010104 - The Ubuntu operating system must encrypt all stored passwords with a FIPS 140-2 approved cryptographic hashing algorithm.

IDENTIFICATION AND AUTHENTICATION

UBTU-18-010105 - The Ubuntu operating system must not have the telnet package installed.

IDENTIFICATION AND AUTHENTICATION

UBTU-18-010106 - The Ubuntu operating system must enforce 24 hours/1 day as the minimum password lifetime. Passwords for new users must have a 24 hours/1 day minimum password lifetime restriction.

IDENTIFICATION AND AUTHENTICATION

UBTU-18-010107 - The Ubuntu operating system must enforce a 60-day maximum password lifetime restriction. Passwords for new users must have a 60-day maximum password lifetime restriction.

IDENTIFICATION AND AUTHENTICATION

UBTU-18-010108 - The Ubuntu operating system must prohibit password reuse for a minimum of five generations.

IDENTIFICATION AND AUTHENTICATION

UBTU-18-010109 - The Ubuntu operating system must enforce a minimum 15-character password length.

IDENTIFICATION AND AUTHENTICATION

UBTU-18-010110 - The Ubuntu operating system must employ a FIPS 140-2 approved cryptographic hashing algorithms for all created and stored passwords.

IDENTIFICATION AND AUTHENTICATION

UBTU-18-010112 - The Ubuntu operating system must allow the use of a temporary password for system logons with an immediate change to a permanent password.

IDENTIFICATION AND AUTHENTICATION

UBTU-18-010113 - The Ubuntu operating system must prevent the use of dictionary words for passwords.

CONFIGURATION MANAGEMENT

UBTU-18-010114 - The Ubuntu operating system must require users to re-authenticate for privilege escalation and changing roles.

IDENTIFICATION AND AUTHENTICATION

UBTU-18-010116 - The Ubuntu Operating system must be configured so that when passwords are changed or new passwords are established, pwquality must be used.

CONFIGURATION MANAGEMENT

UBTU-18-010120 - The Ubuntu operating system must set a sticky bit on all public directories to prevent unauthorized and unintended information transferred via shared system resources.

SYSTEM AND COMMUNICATIONS PROTECTION

UBTU-18-010121 - The Ubuntu operating system must generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.

SYSTEM AND INFORMATION INTEGRITY

UBTU-18-010122 - The Ubuntu operating system must configure the /var/log directory to be group-owned by syslog.

SYSTEM AND INFORMATION INTEGRITY

UBTU-18-010123 - The Ubuntu operating system must configure the /var/log directory to be owned by root.

SYSTEM AND INFORMATION INTEGRITY

UBTU-18-010124 - The Ubuntu operating system must configure the /var/log directory to have mode 0755 or less permissive.

SYSTEM AND INFORMATION INTEGRITY

UBTU-18-010125 - The Ubuntu operating system must configure the /var/log/syslog file to be group-owned by adm.

SYSTEM AND INFORMATION INTEGRITY

UBTU-18-010126 - The Ubuntu operating system must configure /var/log/syslog file to be owned by syslog.

SYSTEM AND INFORMATION INTEGRITY

UBTU-18-010127 - The Ubuntu operating system must configure /var/log/syslog file with mode 0640 or less permissive.

SYSTEM AND INFORMATION INTEGRITY

UBTU-18-010128 - The Ubuntu operating system must configure audit tools with a mode of 0755 or less permissive.

AUDIT AND ACCOUNTABILITY

UBTU-18-010129 - The Ubuntu operating system must configure audit tools to be owned by root.

AUDIT AND ACCOUNTABILITY