Hi all,
Does someone have any experience with a hardened repository on Ubuntu and DISA-STIG compliancy. It seems to be working, but are there some caveats to be kept in mind?
-
- Service Provider
- Posts: 3
- Liked: never
- Joined: Dec 15, 2016 1:23 pm
- Full Name: Jos Maliepaard
- Contact:
-
- Veeam Software
- Posts: 164
- Liked: 38 times
- Joined: Jul 28, 2022 12:57 pm
- Contact:
Re: Ubuntu hardened repository in combination with DISA-STIG
Hello, i don't know if you're considering to harden your OS with nist security profile.
There is a KB about it on V11:
https://www.veeam.com/kb4250
Normally it's fixed on v12 but didn't had the opportunity to test it for the moment.
There is a KB about it on V11:
https://www.veeam.com/kb4250
Normally it's fixed on v12 but didn't had the opportunity to test it for the moment.
Bertrand / TAM EMEA
-
- Product Manager
- Posts: 15114
- Liked: 3224 times
- Joined: Sep 01, 2014 11:46 am
- Full Name: Hannes Kasparick
- Location: Austria
- Contact:
Re: Ubuntu hardened repository in combination with DISA-STIG
Hello,
and welcome to the forums.
The UMASK issue is fixed in V12. We are testing with DISA-STIG hardening on Ubuntu 20.04 (mentioned in this blog post) and plan official documentation on this.
Just curious: which distro are you using and how did you apply DISA STIG hardening (script, ansible...).
Best regards,
Hannes
and welcome to the forums.
that's how it should beIt seems to be working

Just curious: which distro are you using and how did you apply DISA STIG hardening (script, ansible...).
the only thing that comes into my mind with huge impact would be AIDE scanning the backup files. That should be avoided.but are there some caveats to be kept in mind?
Best regards,
Hannes
Who is online
Users browsing this forum: No registered users and 27 guests