Skip to main content

Your submission was sent successfully! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates from Canonical and upcoming events where you can meet our team.Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

  1. Blog
  2. Article

Will Cooke
on 30 July 2018

National Cyber Security Centre publish Ubuntu 18.04 LTS Security Guide


Last week the NCSC (National Cyber Security Centre) in the UK issued their latest publication which gives advice on how to configure Ubuntu 18.04 LTS in accordance with their security best practices.

The National Cyber Security Centre (NCSC)is the UK government department responsible for providing guidance on Information Security to the UK public and private sectors as well as responding to online security incidents and securing networks.

They have published many advisories on topics such as Multi Factor authentication for online services, security reviews of Google’s G Suite and Microsoft’s Office 365 as well as Bring Your Own Device (BYOD) policy.

EUD Security Principles

The “End User Device” (EUD) Security Collection provides “guidance for organisations deploying a range of end user device platforms as part of a remote working solution” but many of the documents are equally applicable to more general enterprise and home use.  There is a wealth of information and best practice guidance which can help you stay secure online. The EUD documents are based around a number of Security Principles which include:

  • Data-in-transit protection – how to keep your data secret while being transmitted over the internet
  • Data-at-rest protection – keeping your files safe on the computer itself
  • Authentication – making sure you are who you say you are
  • Secure Boot – Establishing trust the the operating systems boot process hasn’t been tampered with
  • Platform integrity and application sandboxing – keeping you safe from malware
  • Application whitelisting – restricting software to a specific known list

Securing Ubuntu 18.04 LTS

The latest publication from NCSC gives advice on how to configure Ubuntu 18.04 LTS Desktop to meet the 12 EUD principles with specific worked examples.  The document gives advice and instructions on, among other things:

  • Configuring remote access via VPN
  • Enforcing a strong password policy
  • Configuring UEFI for maximum protection
  • Enabling Livepatch for kernel updates without rebooting
  • Preventing execution of binary files from the home partition
  • Enabling and configuring firewalling
  • Auditing

Ubuntu has been built on a foundation of enterprise-grade, industry leading security practices. From our toolchain to the suite of packages we use and from our update process to our industry standard certifications, Canonical never stops working to keep Ubuntu at the forefront of safety and reliability.

When combined with NCSC’s guidance and instructions you can can be assured of a reliable set up to allow you to work safely and securely from a portable computer while online.

You can view the whole publication from NCSC here:

https://www.ncsc.gov.uk/collection/end-user-device-security/platform-specific-guidance/ubuntu-18-04-lts

You can read more about Ubuntu’s security practices here: https://www.ubuntu.com/security

Related posts


Rajan Patel
27 June 2025

How is Livepatch safeguarded against bad actors?

Security Article

What safeguards the Livepatch security patching solution against bad actors and malicious code masquerading as an update? Learn about Secure Boot and module signing. ...


Rajan Patel
26 June 2025

NodeJS 18 LTS EOL extended from April 2025 to May 2032 on Ubuntu

Ubuntu Article

Canonical provides up to 12 years of security patching for open source software packaged and published through Ubuntu Pro repositories. These security commitments differ from upstream open source software maintainers, like the OpenJS Foundation. ...


ebarretto
18 June 2025

Fixes available for local privilege escalation vulnerability in libblockdev using udisks

Ubuntu Article

Qualys discovered two vulnerabilities in various Linux distributions which allow local attackers to escalate privileges. The first vulnerability (CVE-2025-6018) was found in the PAM configuration. This CVE does not impact default Ubuntu installations because of how the pam_systemd.so and pam_env.so modules are invoked. The second vulnerab ...