CIS: Ubuntu Linux Enterprise Server 18.04
This document provides information about the hotfix containing Center for Internet Security (CIS) templates for Ubuntu 18.04 Benchmark Version 1.0.0, with implementation for 220 rules that can be installed on TrueSight Server Automation 8.9.04 onwards.
Before you begin
Before you install this hotfix, ensure that you perform the following:
- Ensure that all compliance content provided by BMC in your environment is at least updated to version 8.9.04.
- Save backup copies of the sensors folders, which are present on all Application Servers in your environment. The sensors folders contain extended object scripts and is located at the following path on an Application Server:
<Application_Server_installation_directory >/share/sensors
Step 1: Downloading and installing the files
Login to ftp.bmc.com host using SFTP protocol. Download the CIS - Ubuntu Enterprise Linux 18.04.zip and extended_objects.zip packages from the following location:
- Move the Ubuntu Enterprise Linux 18.04.zip package to your RCP client server.
- Extract the contents from the extended_objects.zip package and move them to a temporary location on all Application Servers.
Step 2: Replacing the extended object scripts on all Application Servers
Ensure that you perform the following steps on all the Application Servers in your environment:
- Navigate to the extended objects script files on your Application Server:
<Application_Server_installation_directory >/share/sensors/
Step 3: Importing the Compliance Content
- Log on to the Console.
- Right-click Component Templates and select Import.
The Import Wizard starts. - Select the Import (Version-neutral) option.
- Select the CIS - Ubuntu Enterprise Linux 18.04.zip package and click Next.
The CIS template for CIS Ubuntu 18.04 is available in the CIS - Ubuntu Enterprise Linux 18.04.zip package. To import the templates, select the zip file.
Select the Update objects according to the imported package and Preserve template group path options and click Next.
- Navigate to the last screen of the wizard and then click Finish.
The templates are imported successfully.
Rules within the templates
The following are the details of the 220 rules provided in the zip package. It contains the following types of rules:
- Rules that check for compliance and provides remediation- 170
- Rules that check for compliance but do not provide remediation - 42
- Rules that do not check for compliance and do not provide remediation - 8
The following are the details of the rules that are divided into parts:
- Rules not divided into parts - 183
- Rules Divided into two parts - (24 * 2) = 48 [Rule ID : 1.5.3 , 1.6.1.2 , 1.6.1.3 , 2.1.1 , 2.1.2 , 2.1.3 , 2.1.4 , 2.1.5, 2.1.7 , 3.1.1 , 3.2.5 , 3.2.6 , 3.2.8 , 3.3.3 , 4.1.3 , 4.1.7 , 5.1.8 , 5.2.12 , 5.4.1.1 , 5.4.1.2 , 5.4.1.3 , 5.4.1.4 , 5.4.4 , 5.4.5 ]
- Rules Divided into three parts - (13 * 3) = 39 [Rule ID : 1.5.1 , 1.6.1.1 , 1.6.2.1 , 2.1.6 , 2.2.1.2 , 3.1.2 , 3.2.1 , 3.2.2 , 3.2.3 , 3.2.4 , 3.2.7 , 3.3.1 , 3.3.2 ]
So, the current rule count as per CIS Ubuntu 18.04 template after running the compliance job is 270 (183 + 48 + 39).
The following tables list the rules along with comments.
Rules IDs without compliance checks | Comments |
---|---|
1.2.1 | The apt-cache policy output can vary, so it has to be reviewed by the administrator according to the site policy. |
1.2.2 | GPG keys values can vary because it can be reviewed by the administrator according to the site policy. |
3.6.3, 3.6.4, 3.6.5 | Changing firewall settings while connected over network can result in being locked out of the system. |
4.2.2.4, 4.2.2.5, 4.2.1.5 | Not Applicable |
Rules with compliance checks but no remediation | Comments |
---|---|
1.1.10, 1.1.11, 1.1.12, 1.1.2, 1.1.5, 1.1.6, 1.4.2, 1.7.2, 1.8, 4.2.2.3, 5.4.2, 5.4.3, 5.6, 6.2.1, 6.2.11, 6.2.12, 6.2.14, 6.2.15, 6.2.20 | Remediation not provided as it needs manual intervention by System Administrator. |
1.5.2 | Remediation is not available as package updation/configuration information depends upon organization. |
3.7, 5.4.1.5, 5.5, 6.1.1, 6.2.2, 6.2.3, 6.2.4, 6.2.5, 6.2.7, 4.2.3 | Remediation must be performed manually with required permission. |
3.4.2, 3.4.3 | Remediation is not provided. System Administrator need to create /etc/hosts.allow and /etc/hosts.deny manually as required. |
4.1.18, 4.2.1.4 | Remediation configures the system to immutable mode. |
4.2.1.2, 4.2.2.2 | Editing file entries require manual intervention to take effect. |
1.6.1.4, 6.2.6, 6.2.16, 6.2.17, 6.2.18, 6.2.19 | System administrator is required to approve configuration changes based on the organizational processes and policies. |
Target/Local property | Rule in which property is used | property name | Default Value/ Options | Delimiter |
---|---|---|---|---|
TARGET | 2.2.2, 2.2.3, 2.2.4, 2.2.5, 2.2.6, 2.2.7, 2.2.8, 2.2.9, 2.2.10, 2.2.11 ,2.2.12, 2.2.13 , 2.2.14 , 2.2.16 , 2.2.17 | MISSION_CRITICAL_PACKAGES | BLANK | |
TARGET | 2.2.15 | DEFAULT_MTA | ??TARGET.BSA_CONTENT_DEFAULT_MTA?? | |
LOCAL | 4.2.1.4 | LOGHOSTS_SEND | BLANK | |
LOCAL | 1.1.17 , 1.1.18 , 1.1.19 | MEDIA_PARTITION_LIST | BLANK | |
LOCAL | 4.1.1.1 | AUDIT_MAX_LOG_SIZE | 8 | |
LOCAL | 5.6 | SUDO_GROUP_USER_LIST | root | |
LOCAL | 1.1.1.1, 1.1.1.2, 1.1.1.3, 1.1.1.4, 1.1.1.5, 1.1.1.6, 3.5.1, 3.5.2, 3.5.3, 3.5.4 | KERNEL_MODULES | cramfs freevxfs jffs2 hfs hfsplus udf dccp sctp rds tipc | |
LOCAL | 1.7.1.1 | BANNER_LONG_PART1 | BLANK | |
LOCAL | 1.7.1.2 | BANNER_LONG_PART2 | Authorized users only. All activity may be monitored and reported. | |
LOCAL | 1.7.1.3 | BANNER_LONG_PART3 | Authorized users only. All activity may be monitored and reported. | |
LOCAL | 1.6.1.6 | EXCLUDE_DAEMONS_LIST | tr,ps,egrep,bash,awk | , |
LOCAL | 6.2.5 | USER_LIST | root | |
LOCAL | 6.2.8, 6.2.9, 6.2.10, 6.2.13, 6.2.14 | EXCLUDED_USER_LIST | root,sync,halt,shutdown | , |
LOCAL | 6.2.7 , 6.2.11 , 6.2.12 | EXCLUDE_USERS_LIST | "root","sync","halt","shutdown" | LIST |
LOCAL | 6.2.7 , 6.2.11 , 6.2.12 | NON_LOGIN_SHELLS_LIST | "/sbin/nologin","/bin/false", "/usr/sbin/nologin" | LIST |
LOCAL | 5.5 | SECURE_TERMINALS_LIST | BLANK | |
LOCAL | 5.2.14 | SSH_ALLOW_GROUPS, SSH_ALLOW_USERS, SSH_DENY_GROUPS, and SSH_DENY_USERS | BLANK | |
LOCAL | 2.2.1.2 , 2.2.1.3 | NTP_DAEMON_ENABLED_NAME | (Default) chrony The following value is also available in the list:
| |
LOCAL | 2.2.1.2 , 2.2.1.3 | NTP_SERVERS_LIST | BLANK | |
LOCAL | 4.2.3 | PACKAGE_ENABLED_NAME | (Default) rsyslog The following value is also available in the list:
| |
LOCAL | 5.2.11 | MAC_ALGOS | hmac-sha2-512-etm@openssh.com,hmac-sha2-256-etm@openssh.com,umac-128etm@openssh.com,hmac-sha2-512,hmac-sha2-256,umac-128@openssh.com | |
LOCAL | 5.2.12.1 | CLIENT_ALIVE_INTERVAL_COUNT | 300 | |
LOCAL | 5.2.12.2 | CLIENT_ALIVE_COUNT_MAX | 3 | |
LOCAL | 1.3.2 | AIDE_RUN_SCHEDULE | 0 5 * * * | |
LOCAL | 4.1.18 | AUDIT_RULES_FILE | /etc/audit/audit.rules | |
LOCAL | 1.7.2 | GNOME_BANNER_DISPLAY_CONF | /etc/gdm3/greeter.dconf-defaults | |
LOCAL | 1.7.2 | BANNER_MSG | Authorized users only. All activity may be monitored and reported. | |
LOCAL | 4.3 | LOGROTATE_FILES_RSYSLOG | /var/log/mail.info |