STIGQter STIGQter: STIG Summary: Canonical Ubuntu 18.04 LTS Security Technical Implementation Guide Version: 2 Release: 3 Benchmark Date: 23 Apr 2021:

The Apparmor module must be configured to employ a deny-all, permit-by-exception policy to allow the execution of authorized software programs and limit the ability of non-privileged users to grant other users direct access to the contents of their home directories/folders.

DISA Rule

SV-219324r610963_rule

Vulnerability Number

V-219324

Group Title

SRG-OS-000370-GPOS-00155

Rule Version

UBTU-18-010442

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the Ubuntu operating system to employ a deny-all, permit-by-exception policy to allow the execution of authorized software programs.

Install "Apparmor" (if it is not installed) with the following command:

# sudo apt-get install apparmor

Enable "Apparmor" (if it is not already active) with the following command:

# sudo systemctl enable apparmor.service

Start "Apparmor" with the following command:

# sudo systemctl start apparmor.service

Note: Apparmor must have properly configured profiles for applications and home directories. All configurations will be based on the actual system setup and organization and normally are on a per role basis. See the "Apparmor" documentation for more information on configuring profiles.

Check Contents

Verify that the Ubuntu operating system is configured to employ a deny-all, permit-by-exception policy to allow the execution of authorized software programs and access to user home directories.

Check that "Apparmor" is configured to employ application whitelisting and home directory access control with the following command:

# sudo apparmor_status

apparmor module is loaded.
17 profiles are loaded.
17 profiles are in enforce mode.
/sbin/dhclient
/usr/bin/lxc-start
...
0 processes are in complain mode.
0 processes are unconfined but have a profile defined.

If the defined profiles do not match the organization's list of authorized software, this is a finding.

Vulnerability Number

V-219324

Documentable

False

Rule Version

UBTU-18-010442

Severity Override Guidance

Verify that the Ubuntu operating system is configured to employ a deny-all, permit-by-exception policy to allow the execution of authorized software programs and access to user home directories.

Check that "Apparmor" is configured to employ application whitelisting and home directory access control with the following command:

# sudo apparmor_status

apparmor module is loaded.
17 profiles are loaded.
17 profiles are in enforce mode.
/sbin/dhclient
/usr/bin/lxc-start
...
0 processes are in complain mode.
0 processes are unconfined but have a profile defined.

If the defined profiles do not match the organization's list of authorized software, this is a finding.

Check Content Reference

M

Target Key

4055

Comments