STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 6 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Riverbed NetIM OS Security Technical Implementation Guide

V-275565

CAT II (Medium)

Ubuntu OS must disable the x86 Ctrl-Alt-Delete key sequence.

Rule ID

SV-275565r1147745_rule

STIG

Riverbed NetIM OS Security Technical Implementation Guide

Version

V1R1

CCIs

CCI-000366

Discussion

A locally logged-on user who presses Ctrl-Alt-Delete, when at the console, can reboot the system. If accidentally pressed, as could happen in the case of a mixed OS environment, this can create the risk of short-term loss of availability of systems due to unintentional reboot.

Check Content

Verify Ubuntu OS is not configured to reboot the system when Ctrl-Alt-Delete is pressed by using the following command: 
 
     $ systemctl status ctrl-alt-del.target 
     ctrl-alt-del.target 
          Loaded: masked (Reason: Unit ctrl-alt-del.target is masked.) 
          Active: inactive (dead) 
 
If the "ctrl-alt-del.target" is not masked, this is a finding.

Fix Text

Configure Ubuntu OS to disable the Ctrl-Alt-Delete sequence for the command line by using the following commands: 
 
     $ sudo systemctl disable ctrl-alt-del.target 
 
     $ sudo systemctl mask ctrl-alt-del.target 
 
Reload the daemon to take effect:  
 
     $ sudo systemctl daemon-reload