CIS-Harden your Ubuntu in Google Cloud

Hugo Huang

on 9 November 2021

This article was last updated 3 years ago.


CIS Benchmarks are best practices for the secure configuration of a target system. The Center for Internet Security, Inc. (CIS®) is the authority backing CIS Benchmarks. Ubuntu Pro is entitled to be CIS compliant and packaged with CIS toolings from Canonical.

Let’s SSH into your Ubuntu Pro virtual machine. If you haven’t yet upgrade your Ubuntu LTS to Ubuntu Pro, please follow this tutorial. In less than One Minute, you will be able to get your Ubuntu Pro machine without losing any of your mission critical workloads. Once you SSH into your Ubuntu Pro, input:

You will see:

SERVICE ENTITLEDSTATUSDESCRIPTION
cisyesdisabledCenter for Internet Security Audit Tools
[…]

Let’s enable CIS for this VM:

You will see:

If you check the status:

You will see:

SERVICEENTITLEDSTATUSDESCRIPTION
cisyesenabledCenter for Internet Security Audit Tools
[…]

With tooling packages installed, let’s harden your Ubuntu 16.04 Pro system with CIS Level 1 Server profile:

In less than 3 minutes, your Ubuntu Pro will go through the whole process of hardening and you will get a CIS level-1 compliant environment with no more manual configuration. Let’s audit the system:

The output should be similar to:

The HTML report as shown above will also present your CIS score. For comprehensive CIS hardening instructions, you can check Ubuntu CIS Compliance documentation.

Talk to us today

Interested in running Ubuntu in your organisation?

Newsletter signup

Get the latest Ubuntu news and updates in your inbox.

By submitting this form, I confirm that I have read and agree to Canonical's Privacy Policy.

Related posts

Announcing FIPS 140-3 for Ubuntu Core22

FIPS compliance for IoT use cases in Federal space. In this article, we’ll explore what Ubuntu Core is, and how to use it with FIPS.

When an upstream change broke smartcard FIPS authentication – and how we fixed it

This is the story of how Canonical’s Support team provided bug-fix support: we tracked down an upstream change in OpenSC that inadvertently broke FIPS...

How to avoid package End of Life through backporting 

When a Git vulnerability hit systems past Ubuntu package end of life, teams had to reassess security options. Learn how to stay protected beyond standard support.