Back
🔒
Canonical Ubuntu 20.04 LTS STIG Checklist
Medium
17 items
·
2 hours
testuser
Published 1 month ago
This checklist translates the Canonical Ubuntu 20.04 LTS STIG (Ver 2, Rel 5) into practical, actionable steps for general users and administrators. Use it to harden a managed Ubuntu 20.04 system, improve compliance, and reduce attack surface.
Progress
0 / 17
- Update system packages — Install all available package updates and security patches.
- Enable automatic security updates — Configure unattended-upgrades to auto-install security updates.
- Verify time synchronization — Ensure chrony or ntp is configured and syncing system time.
- Configure the firewall (ufw) — Set default deny inbound, allow only required ports and enable logging.
- Harden SSH configuration — Apply STIG-oriented SSH settings to reduce remote access risks.
- Disable root login over SSH — Prevent direct root SSH access; require sudo from normal accounts.
- Disable password authentication and use SSH keys — Allow only public-key authentication for interactive SSH logins.
- Limit SSH access and enable rate-limiting — Restrict allowed IPs, use AllowUsers/AllowGroups and rate-limit attempts.
- Install and enable auditd — Enable system auditing to record security-relevant events.
- Configure audit rules for sensitive files and actions — Audit changes to /etc, user admin actions, and login events.
- Enable and enforce AppArmor profiles — Ensure AppArmor is active and critical services have enforced profiles.
- Disable unused services and remove unnecessary packages — Stop and remove services/packages that are not required for operation.
- Set secure permissions on /etc/passwd and /etc/shadow — Verify ownership and mode to prevent unauthorized access.
- Install and configure AIDE or other file-integrity monitoring — Initialize a baseline and schedule regular integrity checks.
- Apply sysctl network hardening — Disable IP forwarding, enable rp_filter and tcp_syncookies, and tighten net settings.
- Restrict cron and at usage; review scheduled jobs — Lock down /etc/cron.allow, /etc/cron.d, and remove unauthorized jobs.
- Review and enforce least-privilege for user accounts — Remove inactive accounts, restrict sudoers, and audit privileged users.
Your Stats
🏆
0
Completed
📅
—
Last Done
⏱️
—
Last Time
Completion Rate
Items checked per run
⚡
—
Fastest Run
🔥
0
Streak
🚫
—
Most Skipped Step
🔄
0
Resets
📝 My Notes