SV-219155r610963_rule
V-219155
SRG-OS-000366-GPOS-00153
UBTU-18-010016
CAT II
10
Configure Advance package Tool (APT) to prevent the installation of patches, service packs, device drivers, or Ubuntu operating system components without verification they have been digitally signed using a certificate that is recognized and approved by the organization.
Remove/Update any APT configuration file that contain the variable "AllowUnauthenticated" to "false", or remove "AllowUnauthenticated" entirely from each file. Below is an example of setting the "AllowUnauthenticated" variable to "false":
APT::Get::AllowUnauthenticated "false";
Verify that Advance package Tool (APT) is configured to prevent the installation of patches, service packs, device drivers, or Ubuntu operating system components without verification they have been digitally signed using a certificate that is recognized and approved by the organization.
Check that the "AllowUnauthenticated" variable is not set at all or set to "false" with the following command:
# grep AllowUnauthenticated /etc/apt/apt.conf.d/*
/etc/apt/apt.conf.d/01-vendor-Ubuntu:APT::Get::AllowUnauthenticated "false";
If any of the files returned from the command with "AllowUnauthenticated" set to "true", this is a finding.
V-219155
False
UBTU-18-010016
Verify that Advance package Tool (APT) is configured to prevent the installation of patches, service packs, device drivers, or Ubuntu operating system components without verification they have been digitally signed using a certificate that is recognized and approved by the organization.
Check that the "AllowUnauthenticated" variable is not set at all or set to "false" with the following command:
# grep AllowUnauthenticated /etc/apt/apt.conf.d/*
/etc/apt/apt.conf.d/01-vendor-Ubuntu:APT::Get::AllowUnauthenticated "false";
If any of the files returned from the command with "AllowUnauthenticated" set to "true", this is a finding.
M
4055