STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Canonical Ubuntu 20.04 LTS Security Technical Implementation Guide

V-238360

CAT II (Medium)

The Ubuntu operating system must be configured to use AppArmor.

Rule ID

SV-238360r958804_rule

STIG

Canonical Ubuntu 20.04 LTS Security Technical Implementation Guide

Version

V2R4

CCIs

CCI-001764CCI-001774CCI-002165CCI-002235

Discussion

Control of program execution is a mechanism used to prevent execution of unauthorized programs. Some operating systems may provide a capability that runs counter to the mission or provides users with functionality that exceeds mission requirements. This includes functions and services installed at the operating system-level. Some of the programs, installed by default, may be harmful or may not be necessary to support essential organizational operations (e.g., key missions, functions). Removal of executable programs is not always possible; therefore, establishing a method of preventing program execution is critical to maintaining a secure system baseline. Methods for complying with this requirement include restricting execution of programs in certain environments, while preventing execution in other environments; or limiting execution of certain program functionality based on organization-defined criteria (e.g., privileges, subnets, sandboxed environments, or roles). Satisfies: SRG-OS-000368-GPOS-00154, SRG-OS-000312-GPOS-00122, SRG-OS-000312-GPOS-00123, SRG-OS-000312-GPOS-00124, SRG-OS-000324-GPOS-00125, SRG-OS-000370-GPOS-00155

Check Content

Verify the operating system prevents program execution in accordance with local policies. 
 
Check that AppArmor is installed and active by running the following command, 
 
$ dpkg -l | grep apparmor 
 
If the "apparmor" package is not installed, this is a finding. 
 
$ systemctl is-active apparmor.service 
 
active 
 
If "active" is not returned, this is a finding. 
 
$ systemctl is-enabled apparmor.service 
 
enabled 
 
If "enabled" is not returned, this is a finding.

Fix Text

Install "AppArmor" (if it is not installed) with the following command: 
 
$ sudo apt-get install apparmor 
 
$ sudo systemctl enable apparmor.service 
 
Start "apparmor" with the following command: 
 
$ sudo systemctl start apparmor.service 
 
Note: AppArmor must have properly configured profiles for applications and home directories. All configurations will be based on the actual system setup and organization and normally are on a per role basis. See the AppArmor documentation for more information on configuring profiles.