From 0256ae3183c9e5bfa58c114cca3a27ac82bf5f9e Mon Sep 17 00:00:00 2001 From: MariaPaula Trujillo Date: Thu, 30 Jan 2025 14:51:14 +0100 Subject: [PATCH 01/31] Apply page redesign --- templates/security/fips.html | 875 +++++++++++++++++++++++------------ 1 file changed, 569 insertions(+), 306 deletions(-) diff --git a/templates/security/fips.html b/templates/security/fips.html index 7025e5aab25..03884d5e80a 100644 --- a/templates/security/fips.html +++ b/templates/security/fips.html @@ -6,360 +6,623 @@ Details on the Ubuntu FIPS security certification for Ubuntu Advantage and Ubuntu Pro subscribers. {% endblock %} +{% from "_macros/vf_hero.jinja" import vf_hero %} +{% from "_macros/vf_tiered-list.jinja" import vf_tiered_list %} + +{% block body_class %} + is-paper +{% endblock body_class %} + {% block meta_copydoc %} https://docs.google.com/document/d/1moTJCAtFXKD7ZXrxB-EB7GPVyZRTSIdkP-0BhPZl69M/edit# {% endblock meta_copydoc %} {% block content %} - -
-
-
-

FIPS for Ubuntu

-

FIPS 140 validated cryptography for Linux workloads on Ubuntu

-

- Developing and running Linux workloads for U.S. government regulated and high-security environments requires a long and expensive validation process. Reduce your accreditation timeline and pass on your validation costs with the FIPS 140 certified cryptographic packages of Ubuntu Pro on-premise or on Public Clouds. -

-

- Contact us - Get Ubuntu Pro -

-
-
- {{ image ( - url="https://assets.ubuntu.com/v1/9f048bd7-NIST_logo.svg", - alt="NIST logo", - width="252", - height="66", - hi_def=True, - loading="auto" - ) | safe + {% call(slot) vf_hero( + title_text='FIPS for Ubuntu', + subtitle_text='FIPS 140 validated cryptography for Linux workloads on Ubuntu', + layout='50/50' + ) -%} + {%- if slot == 'description' -%} +

+ Developing and running Linux workloads for U.S. government regulated and high-security environments requires a long and expensive validation process. Reduce your accreditation timeline and pass on your validation costs with the FIPS 140 certified cryptographic packages of Ubuntu Pro on-premise or on Public Clouds. +

+ {%- endif -%} + {%- if slot == 'cta' -%} + Contact us + Get Ubuntu Pro + {%- endif -%} + {%- if slot == 'image' -%} +
+ {{ image(url="https://assets.ubuntu.com/v1/b3df178b-hero-img.png", + alt="", + width="1800", + height="1200", + hi_def=True, + loading="auto", + attrs={"class": "p-image-container__image"},) | safe }}
-
-
+ {%- endif -%} + {% endcall -%} -
-
-
-

Run regulated workloads

-
-

- U.S Federal agencies and anyone deploying systems and cloud services for Federal government agency use, whether directly or through contractors, are required to run workloads with FIPS 140 validated cryptography. FIPS 140 has also been adopted outside of the public sector in industries where data security is heavily regulated, such as financial services (PCI-DSS), healthcare (HIPAA), and other sectors. Ubuntu Pro provides FIPS 140 certified cryptographic packages. -

-
-
-

Reduce your compliance costs

-
-

- Developing applications that comply with FIPS 140 can be a challenging task. Validating the used cryptography in-house involves a long and expensive process that requires cryptography expertise and involves reviews from a 3rd party lab and NIST. All these introduce costs and complexity that may delay your launch. Ensure that you ship on time and reduce both validation costs and time by using the Ubuntu validated standard open source packages. The Ubuntu Pro packages are validated on common CPU types and are also available for use on the public cloud. -

-
-
-

Get NIST certified compliance

-
-

- FIPS 140 ensures that cryptographic algorithms known to be secure are used for data protection, and they are thoroughly tested and attested by a laboratory accredited under the NIST’s Cryptographic and Security Testing (CST) Laboratory Accreditation Program (LAP) in the US and CCCS’s Cryptographic Module Validation Program (CMVP) in Canada. Ubuntu Pro provides you with cryptographic packages that are tested and attested by atsec Information Security, a NIST accredited laboratory. -

-
-
-
+ {%- call(slot) vf_tiered_list(is_list_full_width_on_tablet=true) -%} + {%- if slot == 'title' -%} +

The benefits of FIPS for Ubuntu

+ {%- endif -%} + + {%- if slot == 'list_item_title_1' -%} +

Run regulated workloads

+ {%- endif -%} + + {%- if slot == 'list_item_description_1' -%}

- Read more about FIPS - Contact us + U.S Federal agencies and anyone deploying systems and cloud services for Federal government agency use, whether directly or through contractors, are required to run workloads with FIPS 140 validated cryptography. FIPS 140 has also been adopted outside of the public sector in industries where data security is heavily regulated, such as financial services (PCI-DSS), healthcare (HIPAA), and other sectors. Ubuntu Pro provides FIPS 140 certified cryptographic packages.

-
-
+ {%- endif -%} -
-
-

What is FIPS?

+ {%- if slot == 'list_item_title_2' -%} +

Reduce your compliance costs

+ {%- endif -%} + + {%- if slot == 'list_item_description_2' -%}

- FIPS 140 is a U.S. and Canada Government data protection standard. It defines security requirements related to the design and implementation of a cryptographic module. The reason for a data protection standard dedicated to cryptography is because cryptography today is omnipresent, and is very hard to get right in a constantly expanding threat model such as today’s Internet. The standard ensures that cryptographic algorithms known to be secure are used for data protection, and they are thoroughly tested and attested by a 3rd party. The testing and validation must be performed by a laboratory, which is accredited under the Cryptographic and Security Testing (CST) Laboratory Accreditation Program (LAP) and is part of NIST's National Voluntary Laboratory Accreditation Program (NVLAP) in the US and CCCS's Cryptographic Module Validation Program (CMVP) in Canada. + Developing applications that comply with FIPS 140 can be a challenging task. Validating the used cryptography in-house involves a long and expensive process that requires cryptography expertise and involves reviews from a 3rd party lab and NIST. All these introduce costs and complexity that may delay your launch. Ensure that you ship on time and reduce both validation costs and time by using the Ubuntu validated standard open source packages. The Ubuntu Pro packages are validated on common CPU types and are also available for use on the public cloud.

+ {%- endif -%} + + {%- if slot == 'list_item_title_3' -%} +

Get NIST certified compliance

+ {%- endif -%} + + {%- if slot == 'list_item_description_3' -%}

- FIPS 140-2 is required under multiple compliance regimes, such as the Federal Risk and Authorization Management Program (FedRAMP), the Federal Information Security Management Act of 2002 (FISMA) and the Health Information Technology for Economic and Clinical Health Act (HITECH). + FIPS 140 ensures that cryptographic algorithms known to be secure are used for data protection, and they are thoroughly tested and attested by a laboratory accredited under the NIST’s Cryptographic and Security Testing (CST) Laboratory Accreditation Program (LAP) in the US and CCCS’s Cryptographic Module Validation Program (CMVP) in Canada. Ubuntu Pro provides you with cryptographic packages that are tested and attested by atsec Information Security, a NIST accredited laboratory.

+ {%- endif -%} + + {%- if slot == 'cta' -%} + Contact us + Read more about FIPS › + {%- endif -%} + {%- endcall -%} + +
+
+
+ {{ image(url="https://assets.ubuntu.com/v1/273c35bb-fips-140.png", + alt="", + width="3696", + height="1540", + hi_def=True, + loading="lazy", + attrs={"class": "p-image-container__image"},) | safe + }} +
+
+
+ +
+
+
+
+

What is FIPS?

+
+
+

+ FIPS 140 is a U.S. and Canada Government data protection standard. It defines security requirements related to the design and implementation of a cryptographic module. The reason for a data protection standard dedicated to cryptography is because cryptography today is omnipresent, and is very hard to get right in a constantly expanding threat model such as today’s Internet. The standard ensures that cryptographic algorithms known to be secure are used for data protection, and they are thoroughly tested and attested by a 3rd party. The testing and validation must be performed by a laboratory, which is accredited under the Cryptographic and Security Testing (CST) Laboratory Accreditation Program (LAP) and is part of NIST's National Voluntary Laboratory Accreditation Program (NVLAP) in the US and CCCS's Cryptographic Module Validation Program (CMVP) in Canada. +

+

+ FIPS 140-2 is required under multiple compliance regimes, such as the Federal Risk and Authorization Management Program (FedRAMP), the Federal Information Security Management Act of 2002 (FISMA) and the Health Information Technology for Economic and Clinical Health Act (HITECH). +

+
-
-
-
+
+
+
+

How Ubuntu enables your compliance with FedRAMP, FISMA, FIPS and DISA-STIG

+
+
+

Learn about the US government security standards and the common challenges faced by organizations in their implementation. See how the Ubuntu Security Guide can transform systems compliance in a few minutes. Get to know how Ubuntu is a secure platform for government agencies and complying organizations to build, operate and innovate with open source applications and technologies.

- Contact us -
-
-
- - - +
-
-
-

Access FIPS images on the public cloud

-

- FIPS can be enabled on Ubuntu Pro cloud images, while Ubuntu Pro FIPS cloud images simplify the experience as they come preconfigured with FIPS 140 certified packages optimised for the cloud. You can quickly navigate the marketplace to find the FIPS-enabled images below. -

-
-
-
-

Ubuntu Pro FIPS 16.04

-
-
- - Microsoft Azure Marketplace - - - AWS marketplace - - - Google Cloud - +
+
+
+
+
+

Access FIPS images on the public cloud

-
-
-

Ubuntu Pro FIPS 18.04

-
-
- - Microsoft Azure Marketplace - - - AWS marketplace - - - Google Cloud - +
+

+ FIPS can be enabled on Ubuntu Pro cloud images, while Ubuntu Pro FIPS cloud images simplify the experience as they come preconfigured with FIPS 140 certified packages optimised for the cloud. You can quickly navigate the marketplace to find the FIPS-enabled images below. +

-
-

Ubuntu Pro FIPS 20.04

-
- +
+
+
+

Ubuntu Pro FIPS 16.04

+ +
+

Ubuntu Pro FIPS 18.04

+ +
+

Ubuntu Pro FIPS 20.04

+
-
-

- Interested in FIPS for container images? Read more on this blog. -

+
+
+
+

+ Interested in FIPS for container images? Read more on this blog. +

+
+
-
-
-

Certified packages under FIPS 140

-

- The following list contains the FIPS 140 validated components that are available with Ubuntu Pro. The validated modules are API and ABI compatible with the default Ubuntu packages. The validation testing for Ubuntu was performed by atsec Information Security, a NIST accredited laboratory. -

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- Ubuntu 16.04 LTS -
- on x86-64, IBM Power8 and IBM Z -
- Ubuntu 18.04 LTS -
- on x86-64 and IBM Z -
- Ubuntu 20.04 LTS -
- on x86-64 and IBM Z -
Linux Kernel (GA) Crypto API - #2962, - #3724 - - #3647, #4018, #3664 (AWS), -
- #3683 (Azure), #3954 (GCP) -
- #4366, #4132 (AWS), #4126 (Azure), #4127 (GCP) -
OpenSSH client - #2907 - - #3633 - - #4292 -
OpenSSL - #2888, - #3725 - - #3622, - #3980 -
OpenSSH server - #2906 - - #3632 -
libgcrypt - #3748 - - #3902 -
StrongSwan - #2978 - - #3648 - - #4046 -
- Read more about FIPS - Access the FIPS validated modules +
+
+
+
+
+

+ Certified packages +
+ under FIPS 140-2 +

+
+
+

+ The following list contains the FIPS 140 validated components that are available with Ubuntu Pro. The validated modules are API and ABI compatible with the default Ubuntu packages. The validation testing for Ubuntu was performed by atsec Information Security, a NIST accredited laboratory. Certifications under FIPS 140-2 will be moved to the historical list after September 2026 (although these products can still be purchased and used), and new products are expected to be certified under FIPS 140-3. +

+
+
+
+
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
  + Ubuntu 16.04 LTS +
+ on x86-64, IBM Power8 and IBM Z +
+ Ubuntu 18.04 LTS +
+ on x86-64 and IBM Z +
+ Ubuntu 20.04 LTS +
+ on x86-64 and IBM Z +
Linux Kernel (GA) Crypto API + #2962, + #3724 + + #3647, #4018, #3664 (AWS), +
+ #3683 (Azure), #3954 (GCP) +
+ #4366, #4132 (AWS), #4126 (Azure), #4127 (GCP) +
OpenSSH client + #2907 + + #3633 + + #4292 +
OpenSSL + #2888, + #3725 + + #3622, + #3980 + + #4292 +
OpenSSH server + #2906 + + #3632 + + #4292 +
libgcrypt + #3748 + + #3902 +
StrongSwan + #2978 + + #3648 + + #4046 +
+
+
+
-
-
-

FIPS packages and security updates

-

- Each FIPS 140 certificate is valid for 5 years. However, vulnerabilities happen, and it is our goal to publish fixed packages quickly, irrespective of their certification status. We therefore provide two alternative options. An option to remain with the certified cryptographic packages (called the 'fips' option), and an option to use the certified packages but include security fixes (called the 'fips-updates' option) when available. Check our documentation pages on how to enable these options. -

-

- We strongly recommend enabling the 'fips-updates' option that includes the security fixes. The packages from the 'fips-updates' option are updated to include high and critical security fixes during the whole product lifecycle including the Expanded Security Maintenance (ESM) phase. -

+
+
+
+
+
+

+ Certified packages +
+ under FIPS 140-3 +

+
+
+

+ FIPS 140-3 is a combined effort of NIST and ISO with the Security and Testing requirements for cryptographic modules being published as ISO/IEC 19790 and ISO/IEC 24759. The following list contains the FIPS 140-3 validated components that are available with Ubuntu Pro. The validated modules are API and ABI compatible with the default Ubuntu packages. The validation testing for Ubuntu was performed by atsec Information Security, a NIST accredited laboratory. +

+
+
+
+
+
+
+ + + + + + + + + + + + + + + + + + + + + + + + + +
  + Ubuntu 22.04 LTS +
+ on x86-64, ARM64 and IBM Z +
Linux Kernel (GA) Crypto API + #4894 +
GnuTLS + #4855 +
OpenSSL + #4794 +
StrongSwan + #4911 +
+
+
+
+
-
+
+
+
+
+
+

+ FIPS packages +
+ and security updates +

+
+
+

+ Each FIPS 140 certificate is valid for 5 years. However, vulnerabilities happen, and it is our goal to publish fixed packages quickly, irrespective of their certification status. We therefore provide two alternative options. An option to remain with the certified cryptographic packages (called the 'fips' option), and an option to use the certified packages but include security fixes (called the 'fips-updates' option) when available. Check our documentation pages on how to enable these options. +

+

+ We strongly recommend enabling the 'fips-updates' option that includes the security fixes. The packages from the 'fips-updates' option are updated to include high and critical security fixes during the whole product lifecycle including the Expanded Security Maintenance (ESM) phase. +

+
+
+
-

Free for personal use

-

- Canonical provides Ubuntu Pro subscriptions, which include FIPS, free of charge for individuals on up to 5 machines. For our community of Ubuntu members, we will gladly increase that to 50 machines. -

- Get a free subscription +
+
+ {{ image(url="https://assets.ubuntu.com/v1/35204ee3-fips-packages.png", + alt="", + width="3696", + height="1541", + hi_def=True, + loading="lazy", + attrs={"class": "p-image-container__image"},) | safe + }} +
+
-
-
-

FIPS 140-3 and Ubuntu

-

- In September 2021, NIST phased out FIPS 140-2. Certifications under FIPS 140-2 will be moved to the historical list after September 2026 (although these products can still be purchased and used), and new products are expected to be certified under FIPS 140-3. FIPS 140-3 is a combined effort of NIST and ISO with the Security and Testing requirements for cryptographic modules being published as ISO/IEC 19790 and ISO/IEC 24759. Canonical is preparing Ubuntu for the new certification, and will provide FIPS 140-3 certified cryptographic packages on future LTS releases of Ubuntu, starting with 22.04 Jammy Jellyfish. -

+
+
+
+
+

Free for personal use

+
+
+

+ Canonical provides Ubuntu Pro subscriptions, which include FIPS, free of charge for individuals on up to 5 machines. For our community of Ubuntu members, we will gladly increase that to 50 machines. +

+ +
- {% with first_item="_security_discussion", second_item="_security_esm", third_item="_security_further_reading" %} - {% include "shared/contextual_footers/_contextual_footer.html" %} - {% endwith %} +
+
+
+
+

FIPS 140-3 and Ubuntu

+
+
+

+ In September 2021, NIST phased out FIPS 140-2. Certifications under FIPS 140-2 will be moved to the historical list after September 2026 (although these products can still be purchased and used), and new products are expected to be certified under FIPS 140-3. FIPS 140-3 is a combined effort of NIST and ISO with the Security and Testing requirements for cryptographic modules being published as ISO/IEC 19790 and ISO/IEC 24759. Canonical is preparing Ubuntu for the new certification, and will provide FIPS 140-3 certified cryptographic packages on future LTS releases of Ubuntu, starting with 22.04 Jammy Jellyfish. +

+
+
+
- -
+ +
-{% endblock content %} + {% endblock content %} From 8a27dac1bece38ac6c8e1631ef040089aec0f604 Mon Sep 17 00:00:00 2001 From: MariaPaula Trujillo Date: Fri, 31 Jan 2025 11:09:20 +0100 Subject: [PATCH 02/31] Apply design review --- templates/security/fips.html | 97 ++++++++++++++++++------------------ 1 file changed, 48 insertions(+), 49 deletions(-) diff --git a/templates/security/fips.html b/templates/security/fips.html index 03884d5e80a..076b70b14a2 100644 --- a/templates/security/fips.html +++ b/templates/security/fips.html @@ -34,7 +34,7 @@ Get Ubuntu Pro {%- endif -%} {%- if slot == 'image' -%} -
+
{{ image(url="https://assets.ubuntu.com/v1/b3df178b-hero-img.png", alt="", width="1800", @@ -128,25 +128,23 @@

How Ubuntu enables your compliance with FedRAMP, FISMA, FIPS and DISA-STIG
- -
- {{ image(url="https://assets.ubuntu.com/v1/4d506669-how-ubuntu-webinar.png", - alt="", - width="1800", - height="1013", - hi_def=True, - loading="lazy", - attrs={"class": "p-image-container__image"},) | safe - }} -
-
+
+ {{ image(url="https://assets.ubuntu.com/v1/4d506669-how-ubuntu-webinar.png", + alt="", + width="1800", + height="1013", + hi_def=True, + loading="lazy", + attrs={"class": "p-image-container__image"},) | safe + }} +

Learn about the US government security standards and the common challenges faced by organizations in their implementation. See how the Ubuntu Security Guide can transform systems compliance in a few minutes. Get to know how Ubuntu is a secure platform for government agencies and complying organizations to build, operate and innovate with open source applications and technologies.

@@ -161,7 +159,7 @@

Access FIPS images on the public cloud

- FIPS can be enabled on Ubuntu Pro cloud images, while Ubuntu Pro FIPS cloud images simplify the experience as they come preconfigured with FIPS 140 certified packages optimised for the cloud. You can quickly navigate the marketplace to find the FIPS-enabled images below. + FIPS can be enabled on Ubuntu Pro cloud images, while Ubuntu Pro FIPS cloud images simplify the experience as they come preconfigured with FIPS 140 certified packages optimized for the cloud. You can quickly navigate the marketplace to find the FIPS-enabled images below.

@@ -173,7 +171,8 @@

Ubuntu Pro FIPS 16.04

-
+

@@ -602,27 +615,13 @@

Free for personal use

-
-
-
-
-

FIPS 140-3 and Ubuntu

-
-
-

- In September 2021, NIST phased out FIPS 140-2. Certifications under FIPS 140-2 will be moved to the historical list after September 2026 (although these products can still be purchased and used), and new products are expected to be certified under FIPS 140-3. FIPS 140-3 is a combined effort of NIST and ISO with the Security and Testing requirements for cryptographic modules being published as ISO/IEC 19790 and ISO/IEC 24759. Canonical is preparing Ubuntu for the new certification, and will provide FIPS 140-3 certified cryptographic packages on future LTS releases of Ubuntu, starting with 22.04 Jammy Jellyfish. -

-
-
-
- - -
+ +
- {% endblock content %} +{% endblock content %} From e71ebaf7581d3c5fa6b2c44ce54003cdec43c1b6 Mon Sep 17 00:00:00 2001 From: MariaPaula Trujillo Date: Fri, 31 Jan 2025 14:25:46 +0100 Subject: [PATCH 03/31] Apply code review and switch to form template --- templates/security/fips.html | 109 ++++----- templates/security/form-data.json | 373 ++++++++++++++++++++++++++++++ 2 files changed, 418 insertions(+), 64 deletions(-) create mode 100644 templates/security/form-data.json diff --git a/templates/security/fips.html b/templates/security/fips.html index 076b70b14a2..2ebd65b568c 100644 --- a/templates/security/fips.html +++ b/templates/security/fips.html @@ -58,7 +58,7 @@

Run regulated workloads

{%- if slot == 'list_item_description_1' -%}

- U.S Federal agencies and anyone deploying systems and cloud services for Federal government agency use, whether directly or through contractors, are required to run workloads with FIPS 140 validated cryptography. FIPS 140 has also been adopted outside of the public sector in industries where data security is heavily regulated, such as financial services (PCI-DSS), healthcare (HIPAA), and other sectors. Ubuntu Pro provides FIPS 140 certified cryptographic packages. + US federal agencies and anyone deploying systems and cloud services for Federal government agency use, whether directly or through contractors, are required to run workloads with FIPS 140 validated cryptography. FIPS 140 has also been adopted outside of the public sector in industries where data security is heavily regulated, such as financial services (PCI-DSS), healthcare (HIPAA), and other sectors. Ubuntu Pro provides FIPS 140 certified cryptographic packages.

{%- endif -%} @@ -124,7 +124,7 @@

What is FIPS?


-

How Ubuntu enables your compliance with FedRAMP, FISMA, FIPS and DISA-STIG

+

How Ubuntu enables your compliance with FedRAMP, FISMA, FIPS, and DISA-STIG

@@ -174,15 +174,13 @@

Ubuntu Pro FIPS 16.04

- {{ image ( - url="https://assets.ubuntu.com/v1/6855a62e-azure.png", - alt="", - width="852", - height="481", - hi_def=True, - loading="lazy", - attrs={"class": "p-image-container__image"}, - ) | safe + {{ image(url="https://assets.ubuntu.com/v1/6855a62e-azure.png", + alt="", + width="852", + height="481", + hi_def=True, + loading="lazy", + attrs={"class": "p-image-container__image"},) | safe }}

Microsoft Azure

@@ -192,15 +190,13 @@

Ubuntu Pro FIPS 16.04

- {{ image ( - url="https://assets.ubuntu.com/v1/8438f094-aws.png", - alt="", - width="852", - height="481", - hi_def=True, - loading="lazy", - attrs={"class": "p-image-container__image"}, - ) | safe + {{ image(url="https://assets.ubuntu.com/v1/8438f094-aws.png", + alt="", + width="852", + height="481", + hi_def=True, + loading="lazy", + attrs={"class": "p-image-container__image"},) | safe }}

AWS

@@ -232,15 +228,13 @@

Ubuntu Pro FIPS 18.04

- {{ image ( - url="https://assets.ubuntu.com/v1/6855a62e-azure.png", - alt="", - width="852", - height="481", - hi_def=True, - loading="lazy", - attrs={"class": "p-image-container__image"}, - ) | safe + {{ image(url="https://assets.ubuntu.com/v1/6855a62e-azure.png", + alt="", + width="852", + height="481", + hi_def=True, + loading="lazy", + attrs={"class": "p-image-container__image"},) | safe }}

Microsoft Azure

@@ -250,15 +244,13 @@

Ubuntu Pro FIPS 18.04

- {{ image ( - url="https://assets.ubuntu.com/v1/8438f094-aws.png", - alt="", - width="852", - height="481", - hi_def=True, - loading="lazy", - attrs={"class": "p-image-container__image"}, - ) | safe + {{ image(url="https://assets.ubuntu.com/v1/8438f094-aws.png", + alt="", + width="852", + height="481", + hi_def=True, + loading="lazy", + attrs={"class": "p-image-container__image"},) | safe }}

AWS

@@ -289,15 +281,13 @@

Ubuntu Pro FIPS 20.04

- {{ image ( - url="https://assets.ubuntu.com/v1/6855a62e-azure.png", - alt="", - width="852", - height="481", - hi_def=True, - loading="lazy", - attrs={"class": "p-image-container__image"}, - ) | safe + {{ image(url="https://assets.ubuntu.com/v1/6855a62e-azure.png", + alt="", + width="852", + height="481", + hi_def=True, + loading="lazy", + attrs={"class": "p-image-container__image"},) | safe }}

Microsoft Azure

@@ -307,15 +297,13 @@

Ubuntu Pro FIPS 20.04

- {{ image ( - url="https://assets.ubuntu.com/v1/8438f094-aws.png", - alt="", - width="852", - height="481", - hi_def=True, - loading="lazy", - attrs={"class": "p-image-container__image"}, - ) | safe + {{ image(url="https://assets.ubuntu.com/v1/8438f094-aws.png", + alt="", + width="852", + height="481", + hi_def=True, + loading="lazy", + attrs={"class": "p-image-container__image"},) | safe }}

AWS

@@ -615,13 +603,6 @@

Free for personal use

- -
+ {% include "/shared/forms/form-template.html" %} {% endblock content %} diff --git a/templates/security/form-data.json b/templates/security/form-data.json new file mode 100644 index 00000000000..e29e0678973 --- /dev/null +++ b/templates/security/form-data.json @@ -0,0 +1,373 @@ +{ + "form": { + "/security": { + "templatePath": "/security/index.html", + "childrenPaths": [ + "/security/fips" + ], + "isModal": true, + "modalId": "contact-modal", + "formData": { + "title": "The Ubuntu experts", + "introText": "Canonical certifies, secures and enables enterprise open source on Ubuntu. Tell us about your project so we bring the right team to the conversation.", + "formId": "1257", + "returnUrl": "/security#contact-form-success", + "lpUrl": "https://ubuntu.com/security/contact-us", + "product": "" + }, + "fieldsets": [ + { + "title": "Tell us about your project", + "id": "about-your-project", + "noCommentsFromLead": true, + "fields": [ + { + "type": "long-text", + "id": "about-your-project", + "label": "About your project" + } + ] + }, + { + "title": "If you use Ubuntu, which version(s) are you using?", + "id": "ubuntu-versions", + "inputType": "checkbox-visibility", + "fields": [ + { + "fieldTitle": "LTS within standard support", + "options": [ + { + "type": "checkbox", + "id": "24-04", + "value": "24.04 LTS", + "label": "24.04 LTS" + }, + { + "type": "checkbox", + "id": "22-04", + "value": "22.04 LTS", + "label": "22.04 LTS" + }, + { + "type": "checkbox", + "id": "20-04", + "value": "20.04 LTS", + "label": "20.04 LTS" + } + ] + }, + { + "fieldTitle": "LTS out of standard support", + "options": [ + { + "type": "checkbox", + "id": "18-04", + "value": "18.04 LTS", + "label": "18.04 LTS" + }, + { + "type": "checkbox", + "id": "16-04", + "value": "16.04 LTS", + "label": "16.04 LTS" + }, + { + "type": "checkbox", + "id": "14-04", + "value": "14.04 LTS", + "label": "14.04 LTS" + } + ] + }, + { + "fieldTitle": "Outdated or non-LTS releases non-LTS release", + "options": [ + { + "type": "checkbox", + "id": "22-10", + "value": "22.10", + "label": "non-LTS release" + }, + { + "type": "checkbox", + "id": "12-04", + "value": "12.04 LTS", + "label": "12.04 LTS" + } + ] + }, + { + "fieldTitle": "Other", + "options": [ + { + "type": "checkbox", + "id": "dont-use-ubuntu-today", + "value": "I don't use Ubuntu today", + "label": "I don't use Ubuntu today" + }, + { + "type": "checkbox", + "id": "i-dont'know", + "value": "I don't know", + "label": "I don't know" + } + ] + } + ] + }, + { + "title": "What kind of device are you using?", + "id": "kind-of-device", + "isRequired": true, + "inputType": "checkbox", + "fields": [ + { + "type": "checkbox", + "id": "desktop-workstation", + "value": "desktop/workstation", + "label": "Desktop workstation" + }, + { + "type": "checkbox", + "id": "physical-server", + "value": "physical/server", + "label": "Physical server" + }, + { + "type": "checkbox", + "id": "public-cloud", + "value": "public/cloud", + "label": "Public cloud" + }, + { + "type": "checkbox", + "id": "virtual-machine", + "value": "virtual/machine", + "label": "Virtual machine" + }, + { + "type": "checkbox", + "id": "iot-edge-device", + "value": "iot/edge device", + "label": "IoT/Edge device" + } + ] + }, + { + "title": "How many devices?", + "id": "how-many-machines", + "inputName": "how-many-machines-do-you-have", + "inputType": "radio", + "isRequired": true, + "fields": [ + { + "type": "radio", + "id": "less-5-machines", + "value": "less than 5", + "label": "< 5 machines" + }, + { + "type": "radio", + "id": "5-to-15-machines", + "value": "5 to 15 machines", + "label": "5 - 15 machines" + }, + { + "type": "radio", + "id": "15-to-50-machines", + "value": "15 to 50 machines", + "label": "15 - 50 machines" + }, + { + "type": "radio", + "id": "50-to-100-machines", + "value": "50 to 100 machines", + "label": "50 - 100 machines" + }, + { + "type": "radio", + "id": "greater-than-100", + "value": "greater than 100", + "label": "> 100 machines" + } + ] + }, + { + "title": "How do you consume open source?", + "id": "how-do-you-consume-open-source", + "fields": [ + { + "type": "checkbox", + "id": "ubuntu-repositories", + "value": "Ubuntu repositories", + "label": "Ubuntu repositories" + }, + { + "type": "checkbox", + "id": "github-upstream", + "value": "GitHub/Upstream", + "label": "GitHub/Upstream" + }, + { + "type": "checkbox", + "id": "internally-approved-repository", + "value": "Internally approved repository", + "label": "Internally approved repository" + }, + { + "type": "checkbox", + "id": "i-dont-know", + "value": "I don't know", + "label": "I don't know" + } + ] + }, + { + "title": "Do you have specific compliance or hardening requirements?", + "id": "hardening-requirements", + "fields": [ + { + "type": "checkbox", + "id": "pci", + "value": "PCI-DSS", + "label": "PCI-DSS" + }, + { + "type": "checkbox", + "id": "hipaa", + "value": "HIPAA", + "label": "HIPAA" + }, + { + "type": "checkbox", + "id": "fisma", + "value": "FISMA", + "label": "FISMA" + }, + { + "type": "checkbox", + "id": "fips-140", + "value": "FIPS 140", + "label": "FIPS 140" + }, + { + "type": "checkbox", + "id": "ncsc", + "value": "NCSC", + "label": "NCSC" + }, + { + "type": "checkbox", + "id": "disa-stig", + "value": "DISA-STIG", + "label": "DISA-STIG" + }, + { + "type": "checkbox", + "id": "fedramp", + "value": "FedRAMP", + "label": "FedRAMP" + }, + { + "type": "checkbox", + "id": "cis-benchmark", + "value": "CIS Benchmark", + "label": "CIS Benchmark" + } + ] + }, + { + "title": "Who is responsible for tracking, testing and applying CVE patches in a timely manner?", + "id": "responsible-for-tracking", + "fields": [ + { + "type": "checkbox", + "id": "individual-developers", + "value": "Individual developers", + "label": "Individual developers" + }, + { + "type": "checkbox", + "id": "project-team", + "value": "The project team", + "label": "The project team" + }, + { + "type": "checkbox", + "id": "third-party-vendor", + "value": "Third-party vendor", + "label": "Third-party vendor" + }, + { + "type": "checkbox", + "id": "i-dont-know", + "value": "I don't know", + "label": "I don't know" + } + ] + }, + { + "title": "What advice are you looking for?", + "id": "advice", + "noCommentsFromLead": true, + "fields": [ + { + "type": "long-text", + "id": "advice", + "label": "Tell us about your challenges and your goals" + } + ] + }, + { + "title": "How should we get in touch?", + "id": "about-you", + "noCommentsFromLead": true, + "fields": [ + { + "type": "text", + "id": "firstName", + "label": "First name", + "isRequired": true + }, + { + "type": "text", + "id": "lastName", + "label": "Last name", + "isRequired": true + }, + { + "type": "text", + "id": "company", + "label": "Company", + "isRequired": false + }, + { + "type": "text", + "id": "jobTitle", + "label": "Job title", + "isRequired": false + }, + { + "type": "email", + "id": "email", + "label": "Email address", + "isRequired": true + }, + { + "type": "tel", + "id": "phone", + "label": "Mobile/cell phone number", + "isRequired": true + }, + { + "type": "country", + "id": "country", + "label": "Country", + "isRequired": false + } + ] + } + ] + } + } + } \ No newline at end of file From a41756eeccc73a0cf2f170ca8acbb3b40d8ffb30 Mon Sep 17 00:00:00 2001 From: MariaPaula Trujillo Date: Fri, 31 Jan 2025 14:28:03 +0100 Subject: [PATCH 04/31] Update templates/security/fips.html Co-authored-by: Muhammad Ali --- templates/security/fips.html | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/templates/security/fips.html b/templates/security/fips.html index 2ebd65b568c..3220e79e3ae 100644 --- a/templates/security/fips.html +++ b/templates/security/fips.html @@ -353,7 +353,7 @@

- The following list contains the FIPS 140 validated components that are available with Ubuntu Pro. The validated modules are API and ABI compatible with the default Ubuntu packages. The validation testing for Ubuntu was performed by atsec Information Security, a NIST accredited laboratory. Certifications under FIPS 140-2 will be moved to the historical list after September 2026 (although these products can still be purchased and used), and new products are expected to be certified under FIPS 140-3. + The following list contains the FIPS 140-2 validated components that are available with Ubuntu Pro. The validated modules are API and ABI compatible with the default Ubuntu packages. The validation testing for Ubuntu was performed by atsec Information Security, a NIST accredited laboratory. Certifications under FIPS 140-2 will be moved to the historical list after September 2026 (although these products can still be purchased and used), and new products are expected to be certified under FIPS 140-3.

From 8b81e4bf3fea136cb6192a2ab7725e76a579d377 Mon Sep 17 00:00:00 2001 From: Madhur Jain <92226302+immortalcodes@users.noreply.github.com> Date: Mon, 3 Feb 2025 13:44:56 +0530 Subject: [PATCH 05/31] WD-12036 Dev Rebrand /security/cc (#14692) * rebrand /security/cc * upgrade to vanilla 4.20.1 * Design review changes * review changes * review changes --- package.json | 2 +- templates/security/cc.html | 234 ++++++++++++++++++++++--------------- yarn.lock | 8 +- 3 files changed, 145 insertions(+), 99 deletions(-) diff --git a/package.json b/package.json index a61fae292e2..6630144ae2e 100644 --- a/package.json +++ b/package.json @@ -121,7 +121,7 @@ "url-polyfill": "1.1.12", "url-search-params-polyfill": "8.2.5", "use-query-params": "^2.2.1", - "vanilla-framework": "4.18.5", + "vanilla-framework": "4.20.1", "yup": "1.4.0" }, "resolutions": { diff --git a/templates/security/cc.html b/templates/security/cc.html index 011e9edb474..5febd8a2483 100644 --- a/templates/security/cc.html +++ b/templates/security/cc.html @@ -1,113 +1,159 @@ {% extends "security/base_security.html" %} +{% from "_macros/vf_hero.jinja" import vf_hero %} + {% block title %}Common Criteria{% endblock %} -{% block meta_description %}Technical details on the Common Criteria security certification for Ubuntu Advantage subscribers.{% endblock meta_description %} +{% block meta_description %} + Technical details on the Common Criteria security certification for Ubuntu Advantage subscribers. +{% endblock meta_description %} + +{% block meta_copydoc %} + https://docs.google.com/document/d/1JLnHR9Xuuc1t6ojrnBuMWir5XABgf1L7WVpGGtlLaBo/edit# +{% endblock meta_copydoc %} -{% block meta_copydoc %}https://docs.google.com/document/d/1JLnHR9Xuuc1t6ojrnBuMWir5XABgf1L7WVpGGtlLaBo/edit#{% endblock meta_copydoc %} +{% block body_class %} + is-paper +{% endblock body_class %} {% block content %} -
-
-
-

Common Criteria

-

Run high security workloads on the certified configuration of Ubuntu

-

Developing and deploying open source workloads on regulated and high security environments requires rigid certifications. Ubuntu Pro and Ubuntu Advantage provide access to the necessary artifacts to comply with Common Criteria, an international (ISO/IEC 15408) computer security certification for high security environments.

+ {% call(slot) vf_hero( + title_text='Common Criteria', + subtitle_text='Run high security workloads on the certified configuration of Ubuntu', + layout='50/50' + ) -%} + {%- if slot == 'description' -%}

- Contact us + Developing and running open source workloads on regulated and high security environments requires rigid certifications. Ubuntu Pro provides access to the necessary artifacts to comply with Common Criteria, an international (ISO/IEC 15408) computer security certification for high security environments.

+ {%- endif -%} + {%- if slot == 'cta' -%} + Contact us + {%- endif -%} + {% endcall -%} + +
+
+
+
+

What is Common Criteria?

+
+
+

+ Common Criteria (CC) for Information Technology Security Evaluation is an international standard (ISO/IEC IS 15408) for computer security certification, used by Governments, U.S. Federal agencies, financial institutions and many other organizations dealing with sensitive data. It ensures that products are evaluated by licensed laboratories to verify their security properties and that a common methodology is applied in certification. +

+

+ In brief, it is a common methodology to evaluate products' security controls against a set of security claims. The set of security claims is grouped per product and is called a protection profile. There are different protection profiles that apply to different products. The profile Ubuntu derives its security requirements is the Operating System Protection Profile (OSPP). +

+
-
- {{ image ( - url="https://assets.ubuntu.com/v1/7953a068-security-1.svg", - alt="", - width="224", - height="300", - hi_def=True, - loading="lazy" - ) | safe - }} -
-
-
+
-
-
-
-

What is Common Criteria?

-

Common Criteria (CC) for Information Technology Security Evaluation is an international standard (ISO/IEC IS 15408) for computer security certification, used by Governments, U.S. Federal agencies, financial institutions and many other organizations dealing with sensitive data. It ensures that products are evaluated by licensed laboratories to verify their security properties and that a common methodology is applied in certification.

-

In brief, it is a common methodology to evaluate products' security controls against a set of security claims. The set of security claims is grouped per product and is called a protection profile. There are different protection profiles that apply to different products. The profile Ubuntu derives its security requirements is the Operating System Protection Profile (OSPP).

+
+
+
+
+

+ Where is +
+ Common Criteria accepted? +

+
+
+

+ Internationally a Common Criteria certification is accepted by members of the CCRA agreement and the EU SOGIS members. +

+
-
-
-
-
-
-
-

Where is Common Criteria accepted?

-

Internationally a Common Criteria certification is accepted by members of the CCRA agreement and the EU SOGIS members.

+
+ +
+
+
+
+
+

What gets certified in Ubuntu under Common Criteria?

+
+
+
+
+
+ {{ image(url="https://assets.ubuntu.com/v1/fc857049-csec.png", + alt="Csec logo", + width="1800", + height="1013", + hi_def=True, + loading="lazy") | safe + }} +
+
+

+ Ubuntu 18.04 LTS and 16.04 LTS have both been evaluated to assurance level EAL2 through CSEC — The Swedish Certification Body for IT Security. The evaluation testing was performed by atsec Information Security. The following table provides a summary of the releases and platforms that have been certified. +

+
+
+
-
-
-
-
-
-
-

What gets certified in Ubuntu under Common Criteria?

-

Ubuntu 18.04 LTS and 16.04 LTS have both been evaluated to assurance level EAL2 through CSEC – The Swedish Certification Body for IT Security. The evaluation testing was performed by atsec Information Security. The following table provides a summary of the releases and platforms that have been certified.

+
+ + + + + + + + + + + + + + + + + + + + + + + +
Ubuntu versionPlatformCertification reportAdditional information
Ubuntu 16.04 LTSx86_64, IBM Power8 and IBM Z + 16.04.4 + + Installation instructions +
Ubuntu 18.04 LTSx86_64 and IBM Z + 18.04.4 + + Installation instructions +
-
- {{ image ( - url="https://assets.ubuntu.com/v1/961a1ad1-csec-logo-removebg-preview.png", - alt="", - width="180", - height="205", - hi_def=True, - loading="lazy" - ) | safe - }} +
+ +
+ +
+ -
-
-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - -
Ubuntu versionPlatformCertification reportAdditional information
Ubuntu 16.04 LTSx86_64, IBM Power8 and IBM Z16.04.4Installation instructions
Ubuntu 18.04 LTSx86_64 and IBM Z18.04.4Installation instructions
-

- Contact us -

-
-
+
- -
-
+ +
{% endblock content %} -{% block footer_extra %}{{ marketo }}{% endblock footer_extra %} + +{% block footer_extra %} + {{ marketo }} +{% endblock footer_extra %} diff --git a/yarn.lock b/yarn.lock index 9882138636c..b2e64f8baa9 100644 --- a/yarn.lock +++ b/yarn.lock @@ -7418,10 +7418,10 @@ v8-to-istanbul@^9.0.1: "@types/istanbul-lib-coverage" "^2.0.1" convert-source-map "^2.0.0" -vanilla-framework@4.18.5: - version "4.18.5" - resolved "https://registry.yarnpkg.com/vanilla-framework/-/vanilla-framework-4.18.5.tgz#038e3bbeaeca49ae6cf6a074e0ed83901818eae6" - integrity sha512-UuYI6se/IV/u9YfzYPIs2FNJapgi9ld7F3s9IbjeR0yCvfH1HCjfZdDPD23tkQDBHiT6wNT6wugXDqFnunVJfQ== +vanilla-framework@4.20.1: + version "4.20.1" + resolved "https://registry.yarnpkg.com/vanilla-framework/-/vanilla-framework-4.20.1.tgz#d9321151618299e2e4137a13f89de9162450bf50" + integrity sha512-Ymlo586o1vGntcLN52QAZc5B8frAXXMFVsoMnJZ5JqnZkCP0dK01RZ3FAL/XyNeAEcfAlSRJWEu3aWA61f5ong== vanilla-framework@4.9.0: version "4.9.0" From 3bc6bf3eb2dccb3b796089727c531fea7c5dc9a8 Mon Sep 17 00:00:00 2001 From: MariaPaula Trujillo Date: Tue, 28 Jan 2025 17:47:53 +0100 Subject: [PATCH 06/31] Apply page refresh --- templates/security/index.html | 745 +++++++++++------- templates/shared/_case-study-itstrategen.html | 22 - 2 files changed, 447 insertions(+), 320 deletions(-) delete mode 100644 templates/shared/_case-study-itstrategen.html diff --git a/templates/security/index.html b/templates/security/index.html index 6f3854054b6..61f473344e9 100644 --- a/templates/security/index.html +++ b/templates/security/index.html @@ -6,258 +6,305 @@ Companies around the world rely on Ubuntu for secure open source solutions. We work with our customers to meet the highest security standards. {% endblock %} +{% from "_macros/vf_hero.jinja" import vf_hero %} + {% block meta_copydoc %} https://docs.google.com/document/d/1yEocR1WXQvN_B1L1yBYrG_0D7ikS6QhcOz27sYs-teI/edit {% endblock meta_copydoc %} +{% block body_class %} + is-paper +{% endblock body_class %} + {% block content %} -
-
-
-

Dedicated to the security of Ubuntu

-

- Since its inception in 2004, Ubuntu has been built on a foundation of enterprise-grade, industry leading security practices. From our toolchain to the suite of packages we use and from our update process to our industry standard certifications, Canonical never stops working to keep Ubuntu at the forefront of safety and reliability. -

-

- Watch the Ubuntu cybersecurity webinar - Contact us -

-
-
- {{ image(url="https://assets.ubuntu.com/v1/c3814c0a-shields-security-white.svg", - alt="", - height="185", - width="325", - hi_def=True, - loading="auto") | safe + {% call(slot) vf_hero( + title_text='Dedicated to the security of Ubuntu', + layout='50/50-full-width-image' + ) -%} + {%- if slot == 'description' -%} +

+ Since its inception in 2004, Ubuntu has been built on a foundation of enterprise-grade, industry leading security practices. From our toolchain to the suite of packages we use and from our update process to our industry standard certifications, Canonical never stops working to keep Ubuntu at the forefront of safety and reliability. +

+ {%- endif -%} + {%- if slot == 'cta' -%} + Contact us + Watch the Ubuntu cybersecurity webinar › + {%- endif -%} + {%- if slot == 'image' -%} +
+ {{ image( + url="https://assets.ubuntu.com/v1/99a76c31-hero.png", + alt="", + width="2464", + height="1028", + hi_def=True, + loading="auto", + attrs={"class": "p-image-container__image"} + ) | safe }}
+ {% endif -%} + {% endcall -%} + + + +
+
+
+
+
+ Need information about the Cyber Resilience Act (CRA)? Canonical is committed to delivering CRA-compliant Ubuntu. To learn more, visit our dedicated webpage for understanding the CRA and its requirements, or contact our sales team. +
+
+
- {% include "shared/_cra-banner.html" %} - -
-
-
-

Secure out of the box

-

- All Canonical products are built with unrivalled security in mind — and tested to ensure they deliver it. Your Ubuntu software is secure from the moment you install it, and will remain so as Canonical ensures security updates are always available on Ubuntu first. -

-

- Learn more about Ubuntu’s security features -

+
+
+
+

Heading pending

-
-

Hardening at scale

-

- The default configuration of Ubuntu LTS releases balances between usability, performance and security. However, non general purpose systems can be further hardened to reduce their attack surface. Canonical provides certified tooling for automated audit and hardening. Comply with widely accepted industry hardening profiles, including CIS and DISA-STIG. -

-

- Learn more about hardening Ubuntu › -

-
-
-

Certified compliance

-

- Canonical offers a range of tools to enable organisations to manage their desktop fleet and cloud with specific compliance requirements. A FIPS (Federal Information Processing Standard) certified version of Ubuntu is also available to comply to US government standards. -

-

- Learn more about Ubuntu with FIPS 140 › -

+
+
+
+
+
+
+
+

Secure out of the box

+
+

+ All Canonical products are built with unrivaled security in mind — and tested to ensure they deliver it. Your Ubuntu software is secure from the moment you install it, and will remain so as Canonical ensures security updates are always available on Ubuntu first. +

+ +
+ +
+
+
+

Hardening at scale

+
+ +

+ The default configuration of Ubuntu LTS releases balances between usability, performance and security. However, non general purpose systems can be further hardened to reduce their attack surface. Canonical provides certified tooling for automated audit and hardening. Comply with widely accepted industry hardening profiles, including CIS and DISA-STIG. +

+ +
+ +
+
+
+

Certified compliance

+
+

+ Canonical offers a range of tools to enable organizations to manage their desktop fleet and cloud with specific compliance requirements. A FIPS (Federal Information Processing Standard) certified version of Ubuntu is also available to comply to US government standards. +

+ +
+
-
-
-
+
+
+
+

Cybersecurity and Compliance with Ubuntu

+
+
+

Learn about cybersecurity and zero trust as well as the common challenges faced in the implementation of cybersecurity programs, including challenges in vulnerability management, secure configuration of software and defenses against malware. See how Canonical and Ubuntu can help manage these challenges and lay the software foundation of a successful cybersecurity program.

-

+

-
-
- - -
-
-
-

Find out more

-
-
-
-

- - {{ image ( - url="https://assets.ubuntu.com/v1/b061c401-White+paper.svg", - alt="", - width="54", - height="47", - hi_def=True, - loading="lazy" - ) | safe - }} - -

- -

- A small to medium-size business guide to cybersecurity › -

+
+
-
+
-

Canonical puts security at the heart of Ubuntu

+
+
+

Canonical puts security at the heart of Ubuntu

+
-
-
    -
  • -
    -

    Fast fixes

    -

    - No system is 100% secure and vulnerabilities will always arise. What matters is the speed and success with which they are resolved — and nobody makes fixes available faster than Canonical. -

    -
    -
  • -
  • -
    -

    Automatic updates

    -

    - Security updates are provided for ten years for long term support (LTS) releases. With the default configuration for unattended upgrades (16.04 and after), these updates get applied to your system automatically. -

    -
    -
  • -
  • -
    -

    Livepatch

    -

    - The Ubuntu Livepatch Service enables live automatic security fixes to the kernel without rebooting. This service reduces unplanned downtime while maintaining compliance and security. -

    -
    -
  • -
  • -
    -

    10 years of support

    -

    - A new LTS (Long Term Support) version of Ubuntu is released every two years, for desktop and server. Both versions receive updates and are supported for ten years. -

    -
    -
  • -
  • -
    -

    Expanded security

    -

    - Canonical offers Expanded Security Maintenance (ESM) for infrastructure and applications to provide kernel livepatches and vulnerability fixes through a secure and private archive. -

    -
    -
  • -
  • -
    -

    FIPS

    -

    - Ubuntu provides you with FIPS 140 certified cryptographic packages enabling Linux workloads to run on U.S. government regulated and high security environments. -

    -
    -
  • -
  • -
    -

    Designed to be secure

    -

    - Linux is based on Unix. It inherits Discretionary Access Control and includes Mandatory Access Control via AppArmor. -

    +
    +
    +
    +
    +
    +
    +

    Fast fixes

    +

    + No system is 100% secure and vulnerabilities will always arise. What matters is the speed and success with which they are resolved — and nobody makes fixes available faster than Canonical. +

    +
    +
    +

    Automatic updates

    +

    + Security updates are provided for ten years for long term support (LTS) releases. With the default configuration for unattended upgrades (16.04 and after), these updates get applied to your system automatically. +

    +
    +
    +

    Livepatch

    +

    + The Ubuntu Livepatch Service enables live automatic security fixes to the kernel without rebooting. This service reduces unplanned downtime while maintaining compliance and security. +

    +
    -
  • -
  • -
    -

    Protected VMs

    - +
    +
    +
    +
    +
    +

    10 years of support

    +

    + A new LTS (Long Term Support) version of Ubuntu is released every two years, for desktop and server. Both versions receive updates and are supported for ten years. +

    +
    +
    +

    Expanded security

    +

    + Canonical offers Expanded Security Maintenance (ESM) for infrastructure and applications to provide kernel livepatches and vulnerability fixes through a secure and private archive. +

    +
    +
    +

    FIPS

    +

    + Ubuntu provides you with FIPS 140 certified cryptographic packages enabling Linux workloads to run on U.S. government regulated and high security environments. +

    +
    -
  • -
  • -
    -

    Secure snap packages

    -

    - Software packages delivered as strict-mode snaps are fully confined using AppArmor, device cgroups, and seccomp. -

    +
    +
    +
    +
    +
    +

    Designed to be secure

    +

    + Linux is based on Unix. It inherits Discretionary Access Control and includes Mandatory Access Control via AppArmor. +

    +
    +
    +

    Protected VMs

    +

    + LXD containers, libvirt VMs and OpenStack VMs are protected by AppArmor by default. A rich set of profiles are provided so users can opt-in to protection for other applications. +

    +
    +
    +

    Secure snap packages

    +

    + Software packages delivered as strict-mode snaps are fully confined using AppArmor, device cgroups, and seccomp. +

    +
    -
  • -
+
+
- {% include "shared/_case-study-itstrategen.html" %} +
+
+
+
+

Learn how ITstrategen keeps their applications secure with Ubuntu

+
+
+
+
+ {{ image( + url="https://assets.ubuntu.com/v1/d2c94444-it-strategen.png", + alt="", + width="1200", + height="801", + hi_def=True, + loading="lazy", + attrs={"class": "p-image-container__image"} + ) | safe + }} +
+
+

The security of customer data is of the utmost importance to ITstrategen, which is why Ubuntu is their server operating system of choice.

+ +
+
+
-
+

Ubuntu is trusted by

@@ -347,91 +394,176 @@

Ubuntu is trusted by

-
-
-
+
+
+
+

Find out why the UK Government puts Ubuntu in first place for security

+
+

CESG, the security arm of the UK government rated Ubuntu as the most secure operating system of the 11 they tested.

-

+

-
- {{ image(url="https://assets.ubuntu.com/v1/7953a068-security-1.svg", - alt="", - height="240", - width="200", - hi_def=True, - loading="lazy", - attrs={"class": "u-hide--small u-hide--medium"}) | safe - }} +
-
-
-
+
+
+
+

Helping you manage security

+
+

Every Long Term Support (LTS) release of Ubuntu comes with five years of free security and maintenance updates for the main OS. Canonical also offers a number of additional products and services to help manage the security of your Ubuntu systems.

-
-
-

Reduce downtime and unplanned work

-

+

+
+
+
+ {{ image( + url="https://assets.ubuntu.com/v1/13fc2636-reduce-downtime.png", + alt="", + width="568", + height="853", + hi_def=True, + loading="lazy", + attrs={"class": "p-image-container__image"} + ) | safe + }} +
+
+
+
+

+ Reduce downtime and unplanned work +

+
+

The Ubuntu Livepatch service eliminates the need for unplanned maintenance windows for high and critical severity kernel vulnerabilities by patching the Linux kernel while the system runs. Reduce fire drills while keeping uninterrupted service with Ubuntu Livepatch service for up to ten years.

-

- Learn more about the Livepatch Service › -

+
-
-

Be compliant and FIPS certified

-

+ +

+
+
+ {{ image( + url="https://assets.ubuntu.com/v1/38b96c59-be-compliant.png", + alt="", + width="568", + height="853", + hi_def=True, + loading="lazy", + attrs={"class": "p-image-container__image"} + ) | safe + }} +
+
+
+
+

+ Be compliant and FIPS certified +

+
+

Developing and running workloads for high security and government regulated environments requires a long and expensive validation process. Reduce your accreditation timeline and pass on your validation costs with the FIPS 140 and Common Criteria certifications available with Ubuntu Advantage and Pro.

-

- Learn more about Ubuntu certifications › -

+
-
-
-
-

Manage security updates with Landscape

-

+ +

+
+
+ {{ image( + url="https://assets.ubuntu.com/v1/2ef83b71-manage-security.png", + alt="", + width="568", + height="853", + hi_def=True, + loading="lazy", + attrs={"class": "p-image-container__image"} + ) | safe + }} +
+
+
+
+

+ Manage security updates with Landscape +

+
+

Landscape is the leading management tool to deploy, monitor and manage your Ubuntu servers and desktops. Landscape gives the ability to centrally view and manage the security updates that have been applied to their systems and, critically, the security updates which have not yet been applied.

-

- Get Landscape -

+
-
-

Expand your Ubuntu security maintenance

-

+ +

+
+
+ {{ image( + url="https://assets.ubuntu.com/v1/ec15ce25-expand-your-ubuntu.png", + alt="", + width="568", + height="853", + hi_def=True, + loading="lazy", + attrs={"class": "p-image-container__image"} + ) | safe + }} +
+
+
+
+

+ Expand your Ubuntu security maintenance +

+
+

Canonical offers Expanded Security Maintenance (ESM), to Ubuntu Pro customers to provide important security fixes for the kernel and essential user space packages, toolchains, and applications. These updates are delivered via a secure, private archive exclusively available to Canonical customers.

-

- Watch our security compliance webinar now › -

+
-
-
-
+
+
+
+

Ubuntu Pro

-

All of our security products are available for a one off fee.

+
+
+

All of our security products are available for a one off fee.

Ubuntu Pro is the professional package of tools, technology and expertise from Canonical, helping organisations around the world get the most out of their Ubuntu deployments. It includes access to:

-
    +
    +
    • Livepatch: automatic kernel security hotfixes without rebooting
    • FIPS: certified cryptographic modules available for compliance requirements
    • Landscape: the systems management tool for using Ubuntu at scale
    • @@ -441,53 +573,32 @@

      Ubuntu Pro

    • Knowledge Base: a private archive of expert-written articles and tutorials
    • Optional support: phone and web-based support at multiple service levels
    -

    +

-
-
-
-

Talk to a member of our team

-

We can recommend a security solution that best suits the needs of your organisation.

- -
+
-
- {{ image(url="https://assets.ubuntu.com/v1/c4b290c8-Contact+us.svg", - alt="", - height="178", - width="250", - hi_def=True, - loading="lazy",) | safe - }} -
+
+
+

+ Find a security solution that best suits the needs of your organization.

+ Talk to a member of our team › +

-
-
-
- {{ image(url="https://assets.ubuntu.com/v1/7076ef2d-ubuntu-documents.svg", - alt="", - height="178", - width="145", - hi_def=True, - loading="lazy",) | safe - }} -
-
+
+
+
+

Ubuntu security disclosure policy

+
+

Canonical and the Ubuntu Security Team participate in responsible disclosure and collaborate with the wider community on security issues. For more information on how to contact the Ubuntu Security Team and expectations, please refer to our Ubuntu Security disclosure and embargo policy. @@ -496,6 +607,44 @@

Ubuntu security disclosure policy

+
+
+
+
+

Resources

+
+
+ +
+
+
+

Canonical is offering Expanded Security Maintenance

+
+
+

Canonical is offering Ubuntu Expanded Security Maintenance (ESM) for security fixes and essential packages.

+ +
+
+
+
+
+ {% with first_item="_security_discussion", second_item="_security_esm", third_item="_security_further_reading" %} {% include "shared/contextual_footers/_contextual_footer.html" %} {% endwith %} diff --git a/templates/shared/_case-study-itstrategen.html b/templates/shared/_case-study-itstrategen.html deleted file mode 100644 index 71042289b5f..00000000000 --- a/templates/shared/_case-study-itstrategen.html +++ /dev/null @@ -1,22 +0,0 @@ -
-
-
-

Learn how ITstrategen keeps their applications secure with Ubuntu

-

The security of customer data is of the utmost importance to ITstrategen, which is why Ubuntu is their server operating system of choice.

- Read the case study -
- -
- {{ - image( - url="https://assets.ubuntu.com/v1/3e31f0f5-ITstrategen+logo.svg", - alt="", - width="250", - height="56", - hi_def=True, - loading="auto", - ) | safe - }} -
-
-
From 00f1da580facd114da434a15b0ac4c45eb982908 Mon Sep 17 00:00:00 2001 From: MariaPaula Trujillo Date: Wed, 29 Jan 2025 17:48:03 +0100 Subject: [PATCH 07/31] Finish blog section and update missing assets --- templates/security/index.html | 430 ++++++++++++++++++---------------- 1 file changed, 232 insertions(+), 198 deletions(-) diff --git a/templates/security/index.html b/templates/security/index.html index 61f473344e9..a16641def6f 100644 --- a/templates/security/index.html +++ b/templates/security/index.html @@ -21,35 +21,32 @@ {% call(slot) vf_hero( title_text='Dedicated to the security of Ubuntu', layout='50/50-full-width-image' - ) -%} + ) -%} {%- if slot == 'description' -%}

Since its inception in 2004, Ubuntu has been built on a foundation of enterprise-grade, industry leading security practices. From our toolchain to the suite of packages we use and from our update process to our industry standard certifications, Canonical never stops working to keep Ubuntu at the forefront of safety and reliability.

{%- endif -%} {%- if slot == 'cta' -%} - Contact us + Contact us Watch the Ubuntu cybersecurity webinar › + onclick="dataLayer.push({'event' : 'GAEvent', 'eventCategory' : 'External Link', 'eventAction' : 'Watch the Ubuntu security webinar', 'eventLabel' : 'Watch the Ubuntu security webinar', 'eventValue' : undefined });">Watch the Ubuntu cybersecurity webinar › {%- endif -%} {%- if slot == 'image' -%}
- {{ image( - url="https://assets.ubuntu.com/v1/99a76c31-hero.png", - alt="", - width="2464", - height="1028", - hi_def=True, - loading="auto", - attrs={"class": "p-image-container__image"} - ) | safe + {{ image(url="https://assets.ubuntu.com/v1/99a76c31-hero.png", + alt="", + width="2464", + height="1028", + hi_def=True, + loading="auto", + attrs={"class": "p-image-container__image"}) | safe }}
{% endif -%} {% endcall -%} - -
@@ -65,6 +62,7 @@
+

Heading pending

@@ -75,7 +73,7 @@

Heading pending


Secure out of the box

-
+

All Canonical products are built with unrivaled security in mind — and tested to ensure they deliver it. Your Ubuntu software is secure from the moment you install it, and will remain so as Canonical ensures security updates are always available on Ubuntu first.

@@ -85,7 +83,7 @@

Secure out of the box

- +

@@ -101,7 +99,7 @@

Hardening at scale

- +

@@ -129,17 +127,16 @@

Cybersecurity and Compliance with Ubuntu

Secure snap packages

-

- Software packages delivered as strict-mode snaps are fully confined using AppArmor, device cgroups, and seccomp. -

+

Software packages delivered as strict-mode snaps are fully confined using AppArmor, device cgroups, and seccomp.

@@ -284,19 +279,19 @@

Learn how ITstrategen keeps their applications secure with Ubuntu

- {{ image( - url="https://assets.ubuntu.com/v1/d2c94444-it-strategen.png", - alt="", - width="1200", - height="801", - hi_def=True, - loading="lazy", - attrs={"class": "p-image-container__image"} - ) | safe + {{ image(url="https://assets.ubuntu.com/v1/d2c94444-it-strategen.png", + alt="", + width="1200", + height="801", + hi_def=True, + loading="lazy", + attrs={"class": "p-image-container__image"}) | safe }}
-

The security of customer data is of the utmost importance to ITstrategen, which is why Ubuntu is their server operating system of choice.

+

+ The security of customer data is of the utmost importance to ITstrategen, which is why Ubuntu is their server operating system of choice. +

@@ -306,84 +301,95 @@

Learn how ITstrategen keeps their applications secure with Ubuntu

+

Ubuntu is trusted by

-
+
- {{ image(url="https://assets.ubuntu.com/v1/b7693339-logo-bloomberg.svg", - alt="Bloomberg", - height="28", - width="144", + {{ image(url="https://assets.ubuntu.com/v1/528b1e1d-Bloomberg-Logo.png", + alt="Bloomber", + width="313", + height="313", hi_def=True, loading="lazy", attrs={"class": "p-logo-section__logo"}) | safe }}
- {{ image(url="https://assets.ubuntu.com/v1/d8f890fb-logo-at%26t.svg", - alt="AT&T", - height="88", - width="88", + {{ image(url="https://assets.ubuntu.com/v1/288bb95d-AT&T-Logo.png", + alt="AT&T", + width="290", + height="313", hi_def=True, loading="lazy", attrs={"class": "p-logo-section__logo"}) | safe }}
- {{ image(url="https://assets.ubuntu.com/v1/03a06060-logo-deutschetelekom.svg", - alt="Deutsche Telekom", - height="32", - width="144", + {{ image(url="https://assets.ubuntu.com/v1/799cb482-Walmart-logo.png", + alt="Walmart", + width="355", + height="313", hi_def=True, loading="lazy", attrs={"class": "p-logo-section__logo"}) | safe }}
- {{ image(url="https://assets.ubuntu.com/v1/e0f7037f-logo-ebay.svg", + {{ image(url="https://assets.ubuntu.com/v1/86b85fcd-deutsche-telekom.png", + alt="Deutsche Telekom", + width="313", + height="313", + hi_def=True, + loading="auto|lazy", + attrs={"class": "p-logo-section__logo"}) | safe + }} +
+
+ {{ image(url="https://assets.ubuntu.com/v1/14bd7913-ebay-logo.png", alt="Ebay", - height="55", - width="144", + width="232", + height="313", hi_def=True, loading="lazy", attrs={"class": "p-logo-section__logo"}) | safe }}
- {{ image(url="https://assets.ubuntu.com/v1/4d6054f9-logo-cisco.svg", + {{ image(url="https://assets.ubuntu.com/v1/2b182a31-cisco-logo.png", alt="Cisco", - height="76", - width="144", + width="189", + height="313", hi_def=True, loading="lazy", attrs={"class": "p-logo-section__logo"}) | safe }}
- {{ image(url="https://assets.ubuntu.com/v1/73135672-ntt-logo.svg", + {{ image(url="https://assets.ubuntu.com/v1/207d453e-NTT-logo.png", alt="NTT", - height="53", - width="144", + width="254", + height="313", hi_def=True, loading="lazy", attrs={"class": "p-logo-section__logo"}) | safe }}
- {{ image(url="https://assets.ubuntu.com/v1/8393d534-logo-bestbuy.svg", + {{ image(url="https://assets.ubuntu.com/v1/3d62574d-bestbuy-logo.png", alt="Best Buy", - height="84", - width="144", + width="140", + height="313", hi_def=True, - loading="lazy", + loading="auto|lazy", attrs={"class": "p-logo-section__logo"}) | safe }}
- {{ image(url="https://assets.ubuntu.com/v1/0c18b0ae-paypal_logo.svg", - alt="PayPal", - height="36", - width="144", + {{ image(url="https://assets.ubuntu.com/v1/b7cd4edf-paypal-logo.png", + alt="Paypal", + width="280", + height="313", hi_def=True, loading="lazy", attrs={"class": "p-logo-section__logo"}) | safe @@ -405,46 +411,43 @@

Find out why the UK Government puts Ubuntu in first place for security

CESG, the security arm of the UK government rated Ubuntu as the most secure operating system of the 11 they tested.

-
-
-
-

Helping you manage security

-
-
-

- Every Long Term Support (LTS) release of Ubuntu comes with five years of free security and maintenance updates for the main OS. Canonical also offers a number of additional products and services to help manage the security of your Ubuntu systems. -

+
+
+
+
+

Helping you manage security

+
+
+

+ Every Long Term Support (LTS) release of Ubuntu comes with five years of free security and maintenance updates for the main OS. Canonical also offers a number of additional products and services to help manage the security of your Ubuntu systems. +

+
- {{ image( - url="https://assets.ubuntu.com/v1/13fc2636-reduce-downtime.png", - alt="", - width="568", - height="853", - hi_def=True, - loading="lazy", - attrs={"class": "p-image-container__image"} - ) | safe + {{ image(url="https://assets.ubuntu.com/v1/13fc2636-reduce-downtime.png", + alt="", + width="568", + height="853", + hi_def=True, + loading="lazy", + attrs={"class": "p-image-container__image"}) | safe }}
-
-

- Reduce downtime and unplanned work -

+
+

Reduce downtime and unplanned work

The Ubuntu Livepatch service eliminates the need for unplanned maintenance windows for high and critical severity kernel vulnerabilities by patching the Linux kernel while the system runs. Reduce fire drills while keeping uninterrupted service with Ubuntu Livepatch service for up to ten years. @@ -455,27 +458,23 @@

- +
- {{ image( - url="https://assets.ubuntu.com/v1/38b96c59-be-compliant.png", - alt="", - width="568", - height="853", - hi_def=True, - loading="lazy", - attrs={"class": "p-image-container__image"} - ) | safe + {{ image(url="https://assets.ubuntu.com/v1/38b96c59-be-compliant.png", + alt="", + width="568", + height="853", + hi_def=True, + loading="lazy", + attrs={"class": "p-image-container__image"}) | safe }}
-
-
-

- Be compliant and FIPS certified -

+
+
+

Be compliant and FIPS certified

Developing and running workloads for high security and government regulated environments requires a long and expensive validation process. Reduce your accreditation timeline and pass on your validation costs with the FIPS 140 and Common Criteria certifications available with Ubuntu Advantage and Pro. @@ -486,27 +485,23 @@

- +
- {{ image( - url="https://assets.ubuntu.com/v1/2ef83b71-manage-security.png", - alt="", - width="568", - height="853", - hi_def=True, - loading="lazy", - attrs={"class": "p-image-container__image"} - ) | safe + {{ image(url="https://assets.ubuntu.com/v1/2ef83b71-manage-security.png", + alt="", + width="568", + height="853", + hi_def=True, + loading="lazy", + attrs={"class": "p-image-container__image"}) | safe }}
-
-

- Manage security updates with Landscape -

+
+

Manage security updates with Landscape

Landscape is the leading management tool to deploy, monitor and manage your Ubuntu servers and desktops. Landscape gives the ability to centrally view and manage the security updates that have been applied to their systems and, critically, the security updates which have not yet been applied. @@ -517,27 +512,23 @@

- +
- {{ image( - url="https://assets.ubuntu.com/v1/ec15ce25-expand-your-ubuntu.png", - alt="", - width="568", - height="853", - hi_def=True, - loading="lazy", - attrs={"class": "p-image-container__image"} - ) | safe + {{ image(url="https://assets.ubuntu.com/v1/ec15ce25-expand-your-ubuntu.png", + alt="", + width="568", + height="853", + hi_def=True, + loading="lazy", + attrs={"class": "p-image-container__image"}) | safe }}
-
-

- Expand your Ubuntu security maintenance -

+
+

Expand your Ubuntu security maintenance

Canonical offers Expanded Security Maintenance (ESM), to Ubuntu Pro customers to provide important security fixes for the kernel and essential user space packages, toolchains, and applications. These updates are delivered via a secure, private archive exclusively available to Canonical customers. @@ -586,76 +577,119 @@

Ubuntu Pro

- Find a security solution that best suits the needs of your organization.

- Talk to a member of our team › -

-
-
+ Find a security solution that best suits the needs of your organization. +

+ Talk to a member of our team › + +
+
-
-
-
-
-

Ubuntu security disclosure policy

-
-
-

- Canonical and the Ubuntu Security Team participate in responsible disclosure and collaborate with the wider community on security issues. - For more information on how to contact the Ubuntu Security Team and expectations, please refer to our Ubuntu Security disclosure and embargo policy. -

-
+
+
+
+
+

Ubuntu security disclosure policy

-
+
+

+ Canonical and the Ubuntu Security Team participate in responsible disclosure and collaborate with the wider community on security issues. + For more information on how to contact the Ubuntu Security Team and expectations, please refer to our Ubuntu Security disclosure and embargo policy. +

+
+
+
-
-
-
-
-

Resources

+
+
+
+
+

Resources

+
+
+ -
-
-
-

Join the discussion

-
- +
+
+
+

Canonical is offering Expanded Security Maintenance

-
-
-
-

Canonical is offering Expanded Security Maintenance

-
-
-

Canonical is offering Ubuntu Expanded Security Maintenance (ESM) for security fixes and essential packages.

- +
+

Canonical is offering Ubuntu Expanded Security Maintenance (ESM) for security fixes and essential packages.

+
-
+
+
+ +
+
+
+ +
+
+
+
+ + +
+ + +{# djlint:off #} + +{# djlint:on #} - {% with first_item="_security_discussion", second_item="_security_esm", third_item="_security_further_reading" %} - {% include "shared/contextual_footers/_contextual_footer.html" %} - {% endwith %} - - -
+ +
{% endblock content %} From 3c056f37c5000091b4f7d49e9461858411a0650f Mon Sep 17 00:00:00 2001 From: MariaPaula Trujillo Date: Fri, 31 Jan 2025 11:58:54 +0100 Subject: [PATCH 08/31] Apply design review and bump Vanilla version --- package.json | 2 +- templates/security/index.html | 227 +++++++++++++++++----------------- yarn.lock | 8 +- 3 files changed, 116 insertions(+), 121 deletions(-) diff --git a/package.json b/package.json index 6630144ae2e..c0fdb4b5ceb 100644 --- a/package.json +++ b/package.json @@ -121,7 +121,7 @@ "url-polyfill": "1.1.12", "url-search-params-polyfill": "8.2.5", "use-query-params": "^2.2.1", - "vanilla-framework": "4.20.1", + "vanilla-framework": "4.20.3", "yup": "1.4.0" }, "resolutions": { diff --git a/templates/security/index.html b/templates/security/index.html index a16641def6f..0067a7f02f0 100644 --- a/templates/security/index.html +++ b/templates/security/index.html @@ -52,7 +52,7 @@
- Need information about the Cyber Resilience Act (CRA)? Canonical is committed to delivering CRA-compliant Ubuntu. To learn more, visit our dedicated webpage for understanding the CRA and its requirements, or contact our sales team. + Need information about the CRA? Canonical is committed to delivering Cyber Resilience Act (CRA) compliant Ubuntu. To learn more, visit our dedicated webpage on the CRA and its requirements, or contact our sales team.
@@ -127,25 +127,23 @@

Cybersecurity and Compliance with Ubuntu

- -
- {{ image(url="https://assets.ubuntu.com/v1/b1ba7501-webinar.png", - alt="", - width="1200", - height="676", - hi_def=True, - loading="lazy", - attrs={"class": "p-image-container__image"}) | safe - }} -
-
+
+ {{ image(url="https://assets.ubuntu.com/v1/b1ba7501-webinar.png", + alt="", + width="1200", + height="676", + hi_def=True, + loading="lazy", + attrs={"class": "p-image-container__image"}) | safe + }} +

Learn about cybersecurity and zero trust as well as the common challenges faced in the implementation of cybersecurity programs, including challenges in vulnerability management, secure configuration of software and defenses against malware. See how Canonical and Ubuntu can help manage these challenges and lay the software foundation of a successful cybersecurity program.

@@ -199,7 +197,7 @@

Canonical puts security at the heart of Ubuntu

-
+
@@ -222,7 +220,7 @@

Livepatch

-
+
@@ -245,7 +243,7 @@

FIPS

-
+
@@ -293,7 +291,7 @@

Learn how ITstrategen keeps their applications secure with Ubuntu

The security of customer data is of the utmost importance to ITstrategen, which is why Ubuntu is their server operating system of choice.

@@ -307,7 +305,7 @@

Ubuntu is trusted by

{{ image(url="https://assets.ubuntu.com/v1/528b1e1d-Bloomberg-Logo.png", - alt="Bloomber", + alt="Bloomberg", width="313", height="313", hi_def=True, @@ -433,8 +431,8 @@

Helping you manage security

-
-
+
+
{{ image(url="https://assets.ubuntu.com/v1/13fc2636-reduce-downtime.png", alt="", width="568", @@ -460,8 +458,8 @@

Reduce downtime and unplanned work

-
-
+
+
{{ image(url="https://assets.ubuntu.com/v1/38b96c59-be-compliant.png", alt="", width="568", @@ -487,8 +485,8 @@

Be compliant and FIPS certified

-
-
+
+
{{ image(url="https://assets.ubuntu.com/v1/2ef83b71-manage-security.png", alt="", width="568", @@ -514,8 +512,8 @@

Manage security updates with Landscape

-
-
+
+
{{ image(url="https://assets.ubuntu.com/v1/ec15ce25-expand-your-ubuntu.png", alt="", width="568", @@ -551,7 +549,7 @@

Ubuntu Pro

All of our security products are available for a one off fee.

- Ubuntu Pro is the professional package of tools, technology and expertise from Canonical, helping organisations around the world get the most out of their Ubuntu deployments. It includes access to: + Ubuntu Pro is the professional package of tools, technology and expertise from Canonical, helping organizations around the world get the most out of their Ubuntu deployments. It includes access to:


-
-
-
- -
-
+
+
+
+ +
+
+
-
- +
- -{# djlint:off #} + + {# djlint:off #} -{# djlint:on #} - - -
+ {# djlint:on #} + + +
{% endblock content %} diff --git a/yarn.lock b/yarn.lock index b2e64f8baa9..7b3fdeae427 100644 --- a/yarn.lock +++ b/yarn.lock @@ -7418,10 +7418,10 @@ v8-to-istanbul@^9.0.1: "@types/istanbul-lib-coverage" "^2.0.1" convert-source-map "^2.0.0" -vanilla-framework@4.20.1: - version "4.20.1" - resolved "https://registry.yarnpkg.com/vanilla-framework/-/vanilla-framework-4.20.1.tgz#d9321151618299e2e4137a13f89de9162450bf50" - integrity sha512-Ymlo586o1vGntcLN52QAZc5B8frAXXMFVsoMnJZ5JqnZkCP0dK01RZ3FAL/XyNeAEcfAlSRJWEu3aWA61f5ong== +vanilla-framework@4.20.3: + version "4.20.3" + resolved "https://registry.yarnpkg.com/vanilla-framework/-/vanilla-framework-4.20.3.tgz#a306e80f32f5c6b6f107c02e64cc642c6eb32148" + integrity sha512-8nE8BxHRckdjo8VYW0jVLK9JMz1XAoTZcKGweg0jM8cV+/D313pPyomEeODAD1qq66yf/W0RfHTXv/wp0AaYfQ== vanilla-framework@4.9.0: version "4.9.0" From 687bf739bca22ca21fae80b8a1dd59eef3eea529 Mon Sep 17 00:00:00 2001 From: MariaPaula Trujillo Date: Fri, 31 Jan 2025 13:19:24 +0100 Subject: [PATCH 09/31] Add missing heading --- templates/security/index.html | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/templates/security/index.html b/templates/security/index.html index 0067a7f02f0..87fed197279 100644 --- a/templates/security/index.html +++ b/templates/security/index.html @@ -63,7 +63,7 @@

-

Heading pending

+

An OS you can trust

From 6c89b525b574b4b6b4f35293b9f2490ea274b865 Mon Sep 17 00:00:00 2001 From: MariaPaula Trujillo Date: Fri, 31 Jan 2025 15:29:05 +0100 Subject: [PATCH 10/31] Apply copy changes and switch to using form template --- templates/security/index.html | 17 +++++------------ 1 file changed, 5 insertions(+), 12 deletions(-) diff --git a/templates/security/index.html b/templates/security/index.html index 87fed197279..033d258758c 100644 --- a/templates/security/index.html +++ b/templates/security/index.html @@ -49,7 +49,7 @@
-
+
Need information about the CRA? Canonical is committed to delivering Cyber Resilience Act (CRA) compliant Ubuntu. To learn more, visit our dedicated webpage on the CRA and its requirements, or contact our sales team. @@ -72,7 +72,7 @@

An OS you can trust


-

Secure out of the box

+

Securely designed

All Canonical products are built with unrivaled security in mind — and tested to ensure they deliver it. Your Ubuntu software is secure from the moment you install it, and will remain so as Canonical ensures security updates are always available on Ubuntu first. @@ -406,7 +406,7 @@

Find out why the UK Government puts Ubuntu in first place for security

- CESG, the security arm of the UK government rated Ubuntu as the most secure operating system of the 11 they tested. + Communications-Electronics Security Group (CESG), the security arm of the UK government rated Ubuntu as the most secure operating system of the 11 they tested.

+ {% include "/shared/forms/form-template.html" %} + {# djlint:off #} {# djlint:on #} - -
- {% endblock content %} From a4aec87dc9dbcef5e686ba8662bc5eb5da19355e Mon Sep 17 00:00:00 2001 From: MariaPaula Trujillo Date: Tue, 4 Feb 2025 11:55:49 +0100 Subject: [PATCH 11/31] Apply code review and add context to cta --- templates/security/index.html | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/templates/security/index.html b/templates/security/index.html index 033d258758c..aaa1cdd3802 100644 --- a/templates/security/index.html +++ b/templates/security/index.html @@ -79,7 +79,7 @@

Securely designed

@@ -95,7 +95,7 @@

Hardening at scale

@@ -110,7 +110,7 @@

Certified compliance

@@ -127,7 +127,7 @@

Cybersecurity and Compliance with Ubuntu

-
+
{{ image(url="https://assets.ubuntu.com/v1/b1ba7501-webinar.png", alt="", width="1200", @@ -276,7 +276,7 @@

Learn how ITstrategen keeps their applications secure with Ubuntu

-
+
{{ image(url="https://assets.ubuntu.com/v1/d2c94444-it-strategen.png", alt="", width="1200", @@ -291,7 +291,7 @@

Learn how ITstrategen keeps their applications secure with Ubuntu

The security of customer data is of the utmost importance to ITstrategen, which is why Ubuntu is their server operating system of choice.

From f76c4d9d40d93bf3de596923485d9a9c611defd4 Mon Sep 17 00:00:00 2001 From: MariaPaula Trujillo Date: Tue, 4 Feb 2025 13:02:01 +0100 Subject: [PATCH 12/31] Add missing line breaks --- templates/security/index.html | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/templates/security/index.html b/templates/security/index.html index aaa1cdd3802..f5b1a1e7c7b 100644 --- a/templates/security/index.html +++ b/templates/security/index.html @@ -110,7 +110,7 @@

Certified compliance

@@ -452,7 +452,7 @@

Reduce downtime and unplanned work

@@ -479,7 +479,7 @@

Be compliant and FIPS certified

@@ -533,7 +533,7 @@

Expand your Ubuntu security maintenance

From 9085cb7a857d52be7bca340428a4152622d413a6 Mon Sep 17 00:00:00 2001 From: Peter French Date: Fri, 7 Feb 2025 15:41:49 +0100 Subject: [PATCH 13/31] feat(/security/disa-stig): Page redesign (#14702) * feat(/security/disa-stig): Page redesign * style: Format prettier * refactor: Lazy load images * refactor: Apply changes from design&ux review * chore: Bump image-template to 1.5.0 & apply fmt='jpg' to images * fix: Render webinar image as pgn --- requirements.txt | 2 +- static/sass/styles.scss | 8 + templates/security/disa-stig.html | 381 +++++++++++++++++++----------- 3 files changed, 253 insertions(+), 138 deletions(-) diff --git a/requirements.txt b/requirements.txt index b2150aebe1d..5ee1053ed42 100644 --- a/requirements.txt +++ b/requirements.txt @@ -3,7 +3,7 @@ canonicalwebteam.http==1.0.4 canonicalwebteam.blog==6.4.4 canonicalwebteam.search==2.1.1 canonicalwebteam.templatefinder==1.0.0 -canonicalwebteam.image-template==1.3.1 +canonicalwebteam.image-template==1.5.0 canonicalwebteam.discourse==5.7.3 python-dateutil==2.8.2 pytz==2022.7.1 diff --git a/static/sass/styles.scss b/static/sass/styles.scss index cd76d5bf934..f3c30fe906a 100644 --- a/static/sass/styles.scss +++ b/static/sass/styles.scss @@ -1780,3 +1780,11 @@ legend { .p-table--mobile-card tr td { white-space: normal; } + +// XXX: Custom styling to remove the full-stop after the counter in 'p-stepped-list' +ol.p-stepped-list.no-full-stop + .p-stepped-list__item + .p-stepped-list__title::before { + content: counter(p-stepped-list-counter); + text-align: left; +} diff --git a/templates/security/disa-stig.html b/templates/security/disa-stig.html index 1fabc008531..2643b25624d 100644 --- a/templates/security/disa-stig.html +++ b/templates/security/disa-stig.html @@ -1,163 +1,194 @@ {% extends "security/base_security.html" %} +{% from "_macros/vf_hero.jinja" import vf_hero %} + {% block title %}Ubuntu DISA-STIG compliance | Security{% endblock %} {% block meta_description %}Technical details on the Ubuntu DISA-STIG guide for Linux.{% endblock %} {% block meta_copydoc %} - https://docs.google.com/document/d/1zJwZzc-cERj9YKNXFtmrXwynJptyT7-D3qCNzBctRfo/edit# + https://docs.google.com/document/d/1zJwZzc-cERj9YKNXFtmrXwynJptyT7-D3qCNzBctRfo/edit?tab=t.0 {% endblock meta_copydoc %} +{% block body_class %} + is-paper +{% endblock body_class %} + {% block content %} -
-
-
-

DISA-STIG on Ubuntu

-

Comply with the DISA Security Technical Implementation Guide

-

- Security Technical Implementation Guides (STIG) are developed by the Defense Information System Agency (DISA) for the U.S. Department of Defense (DoD). Ubuntu Pro on public cloud and Ubuntu Pro (Infra) have the necessary certifications and controls to comply with DISA-STIG guidelines on Linux. -

- Contact us - Get Ubuntu Pro (Infra) -
-
+ {% call(slot) vf_hero( + title_text='DISA-STIG on Ubuntu', + subtitle_text='Comply with the DISA Security
Technical Implementation Guide', + layout='25/75' + ) -%} + {%- if slot == 'signpost_image' -%} +
{{ image ( - url="https://assets.ubuntu.com/v1/ef01809f-DISA-logo-transparent.png", - alt="DISA-STIG logo", - width="720", - height="264", + url="https://assets.ubuntu.com/v1/92754de5-disa.png", + alt="", + width="852", + height="204", hi_def=True, loading="auto" ) | safe }}
-
-
- -
-
-
+ {%- endif -%} + {%- if slot == 'description' -%} +

+ Security Technical Implementation Guides (STIG) are developed by the Defense Information System Agency (DISA) for the U.S. Department of Defense (DoD). Ubuntu Pro on public cloud and Ubuntu Pro (Infra) have the necessary certifications and controls to comply with DISA-STIG guidelines on Linux. +

+ {%- endif -%} + {%- if slot == 'cta' -%} + Contact us + Get Ubuntu Pro (Infra) › + {%- endif -%} + {%- if slot == 'image' -%} +
+ {{ image(url="https://assets.ubuntu.com/v1/f759a607-hero.png", + alt="", + width="3696", + height="1540", + hi_def=True, + loading="auto", + fmt="jpg", + attrs={"class": "p-image-container__image"}) | safe + }} +
+ {%- endif -%} + {% endcall -%} -
-
-
-

How does Ubuntu enable your compliance with FIPS, and DISA-STIG?

+
+
+
+
+

+ How does Ubuntu enable your compliance with FIPS, +
+ and DISA-STIG? +

+
+
+
+ {{ image(url="https://assets.ubuntu.com/v1/497f33c2-how-ubuntu-enables-webinar.png", + alt="", + width="1800", + height="1013", + hi_def=False, + loading="lazy") | safe + }} +

- Learn about the US government security standards and the common challenges faced by organisations in their implementation. See how the Ubuntu Security Guide can transform systems compliance in a few minutes. Get to know how Ubuntu is a secure platform for government agencies and complying organisations to build, operate and innovate with open source applications and technologies. + Learn about the US government security standards and the common challenges faced by organizations in their implementation. See how the Ubuntu Security Guide can transform systems compliance in a few minutes. Get to know how Ubuntu is a secure platform for government agencies and complying organizations to build, operate and innovate with open source applications and technologies.

- Contact us -
-
-
- - - +
-
+
+
+
+
+

What is DISA-STIG?

+
+
+
+

+ The Defense Information System Agency (DISA) is a US Department of Defense combat support agency. It provides and operates information infrastructure to support military operations and national-level leadership. The Security Technical Implementation Guide (STIG) is a configuration standard consisting of guidelines for hardening systems to improve a system's security posture. It can be seen as a checklist for securing protocols, services, or servers to improve the overall security by reducing the attack surface. +

+
+
+
-

What is DISA-STIG?

-

- The Defense Information System Agency (DISA) is a US Department of Defense combat support agency. It provides and operates information infrastructure to support military operations and national-level leadership. The Security Technical Implementation Guide (STIG) is a configuration standard consisting of guidelines for hardening systems to improve a system’s security posture. It can be seen as a checklist for securing protocols, services, or servers to improve the overall security by reducing the attack surface. -

+
+ {{ image(url="https://assets.ubuntu.com/v1/3c7382e4-what-is-disa.png", + alt="", + width="3696", + height="1541", + hi_def=True, + loading="lazy", + fmt="jpg", + attrs={"class": "p-image-container__image"}) | safe + }} +
-
-
-

DISA-STIG for Ubuntu

-

- Together with Canonical, DISA has developed STIGs for Ubuntu. The U.S. DoD provides the STIG checklist, which can be viewed using STIG viewer, and SCAP content for auditing. The versions of Ubuntu that have STIGs available by DISA are marked on the table below. -

- - - - - - - - - - - - - - - - - -
Ubuntu 16.04 LTSUbuntu 18.04 LTSUbuntu 20.04 LTS
- {{ image ( - url="https://assets.ubuntu.com/v1/ef01809f-DISA-logo-transparent.png", - alt="DISA logo", - width="136", - height="50", - hi_def=True, - attrs={"style": "vertical-align: middle;"}, - loading="lazy" - ) | safe - }} - - Defense Information System Agency Security Technical Implementation Guides (STIGs) and Supplemental Automation Content for Ubuntu - - {{ image(url="https://assets.ubuntu.com/v1/2ccda8d7-tick-orange.svg", alt="Yes: Configuration guide", width="14", height="14", hi_def=True, loading="lazy",) | safe }} - - {{ image(url="https://assets.ubuntu.com/v1/2ccda8d7-tick-orange.svg", alt="Yes: Configuration guide", width="14", height="14", hi_def=True, loading="lazy",) | safe }} - - Yes: Tooling and automation -
-
    -
  • - Yes: Configuration guide - Configuration guide -
  • -
  • - Yes - Tooling and automation -
  • -
- Read more about Ubuntu tooling and automation +
+
+
+
+

DISA-STIG for Ubuntu

+
+
+
+

+ Together with Canonical, DISA has developed STIGs for Ubuntu. The U.S. DoD provides the STIG checklist, which can be viewed using STIG viewer, and SCAP content for auditing. The versions of Ubuntu that have STIGs available by DISA are marked on the table below. +

+ +
+ +
+

+ DISA Security Technical Implementation Guides (STIGs) and Supplemental Automation Content for Ubuntu +

+
+
    +
  • +
    +
    Ubuntu 16.04 LTS
    +
    Configuration guide
    +
    +
  • +
  • +
    +
    Ubuntu 18.04 LTS
    +
    Configuration guide
    +
    +
  • +
  • +
    +
    Ubuntu 20.04 LTS
    +
    Tooling and automation
    +
    +
  • +
  • +
    +
    Ubuntu 22.04 LTS
    +
    Tooling and automation
    +
    +
  • +
+
-
-
-
-

How to audit and comply with DISA-STIG?

-
    +
    +
    +
    +
    +

    + How to audit and comply +
    + with DISA-STIG? +

    +
    +
    +
    1. -

      Auditing

      +

      Auditing

      -

      Using the Ubuntu Security Guide auditing is as simple as:

      +
      +

      Using the Ubuntu Security Guide for auditing is as simple as:

      sudo usg audit disa_stig
      @@ -165,26 +196,102 @@

      Auditing

    2. -

      Compliance

      +
      +

      Compliance

      -

      Using the Ubuntu Security Guide applying the necessary rules for compliance is as simple as:

      +
      +

      Using the Ubuntu Security Guide for applying the necessary rules for compliance is as simple as:

      sudo usg fix disa_stig
      +
      -
    3. -
    -

    - Read more about Ubuntu Security Guide -

    +
    + +
+
+
+ +
+
+
+
+

+ Canonical is offering +
+ Expanded Security Maintenance +

+
+
+
+ {{ image(url="https://assets.ubuntu.com/v1/82d84ea0-canonical-is-offering.png", + alt="", + width="1800", + height="1014", + hi_def=True, + loading="lazy") | safe + }} +
+

Canonical is offering Ubuntu Expanded Security Maintenance (ESM) for security fixes and essential packages.

+
- {% with first_item="_security_discussion", second_item="_security_esm", third_item="_security_further_reading" %} - {% include "shared/contextual_footers/_contextual_footer.html" %} - {% endwith %} +
+
+ +
Date: Thu, 6 Feb 2025 13:02:31 +0100 Subject: [PATCH 14/31] Apply redesign --- templates/security/disclosure-policy.html | 317 ++++++++++++++-------- 1 file changed, 210 insertions(+), 107 deletions(-) diff --git a/templates/security/disclosure-policy.html b/templates/security/disclosure-policy.html index 566b7985ee8..929480aca18 100644 --- a/templates/security/disclosure-policy.html +++ b/templates/security/disclosure-policy.html @@ -1,18 +1,28 @@ {% extends "security/base_security.html" %} -{% block title %}Ubuntu Security disclosure and embargo policy | Security{% endblock %} +{% block title %}Ubuntu Security disclosure and embargo policy{% endblock %} -{% block meta_description %}Canonical and the Ubuntu Security Team participate in responsible disclosure and collaborate with the wider community on security issues. This describes how to contact the Ubuntu Security Team, what you can expect when you contact us, and what we expect from you.{% endblock %} +{% block meta_description %} + Canonical and the Ubuntu Security Team participate in responsible disclosure and collaborate with the wider community on security issues. This describes how to contact the Ubuntu Security Team, what you can expect when you contact us, and what we expect from you. +{% endblock %} -{% block meta_copydoc %}https://docs.google.com/document/d/1WdamniXOHemuPzl6vESYD9StPgh4-PepbqdVHYrzbuI/edit{% endblock meta_copydoc %} +{% block meta_copydoc %} + https://docs.google.com/document/d/1WdamniXOHemuPzl6vESYD9StPgh4-PepbqdVHYrzbuI/edit +{% endblock meta_copydoc %} + +{% block body_class %} + is-paper +{% endblock body_class %} + +{% from "_macros/vf_hero.jinja" import vf_hero %} {% block content %} -
-
-
-

- Ubuntu Security disclosure and embargo policy -

+ + {% call(slot) vf_hero( + title_text='Ubuntu Security disclosure and embargo policy', + layout='50/50-full-width-image' + ) -%} + {%- if slot == 'description' -%}

Valid since: October 2020 Last updated: October 2023 @@ -20,106 +30,199 @@

Canonical and the Ubuntu Security Team participate in responsible disclosure and collaborate with the wider community on security issues. This describes how to contact the Ubuntu Security Team, what you can expect when you contact us, and what we expect from you.

+ {%- endif -%} + {%- if slot == 'image' -%} +
+ {{ image(url="https://assets.ubuntu.com/v1/13de40ac-hero.png", + alt="", + width="2464", + height="1027", + hi_def=True, + loading="auto", + attrs={"class": "p-image-container__image"}) | safe + }} +
+ {% endif -%} + {% endcall -%} + +
+
+
+
+

About Canonical

+
+
+

+ Canonical publishes the Ubuntu operating system in collaboration with a community of Ubuntu developers. Canonical also publishes other software projects such as LXD, MAAS, Juju, snapd, Snapcraft, Landscape, Launchpad and Mir. +

+

+ Canonical's Ubuntu Security Team tends to the security needs of the Ubuntu operating system and serves as a point of contact for Canonical-authored software, both proprietary and open-source, as well as Canonical-owned and -managed infrastructure. +

+

+ Please contact us if you believe you have found a security issue in Ubuntu, Canonical software or Canonical services. +

+
-

-
+
-
-
-
-

- About Canonical -

-

- Canonical publishes the Ubuntu operating system in collaboration with a community of Ubuntu developers. Canonical also publishes other software projects such as LXD, MAAS, Juju, snapd, Snapcraft, Landscape, Launchpad and Mir. -

-

- Canonical's Ubuntu Security Team tends to the security needs of the Ubuntu operating system and serves as a point of contact for Canonical-authored software, both proprietary and open-source, as well as Canonical-owned and -managed infrastructure. -

-

- Please contact us if you believe you have found a security issue in Ubuntu, Canonical software or Canonical services. -

-

- How to report an issue to us -

-

- You may report issues to the Ubuntu Security Team via the Launchpad.net bug reporting interface (ubuntu-bug <packagename> is the most convenient way to get to the bug reporting form). Please be aware that Launchpad.net will send email in plaintext in response to bug reports. -

-

- You may also send email to security@ubuntu.com. Email may optionally be encrypted to OpenPGP key 4072 60F7 616E CE4D 9D12 4627 98E9 740D C345 39E0: https://keyserver.ubuntu.com/pks/lookup?op=get&search=0x407260f7616ece4d9d12462798e9740dc34539e0 -

-

- If you have a deadline for public disclosure, please let us know. -

-

- Scope -

-

- Ubuntu is built on the contributions of thousands of projects. Usually issues that affect Ubuntu will affect other projects and other Linux distributions. Sometimes we may ask reporters to contact upstream developers. -

-

- The Ubuntu distribution is divided into multiple pockets: main, universe, restricted, and multiverse. Packages in main are supported by the Ubuntu Security Team. Packages in universe and multiverse are supported by the community; the Ubuntu Security Team can sponsor fixes prepared and tested by community members. -

-

- Packages in restricted are supported by Canonical's business partners. The Ubuntu Security Team can coordinate with our partners. -

-

- Software written by Canonical, but delivered outside of Ubuntu, is supported by different teams at Canonical. The Ubuntu Security Team is happy to coordinate communication between external entities (i.e. analysts, reporters) and supporting teams within Canonical, as well as provide guidance and feedback. -

-

- The Canonical Launchpad code hosting service, Canonical Snap Store, and Canonical Juju Charm Store allows anyone to publish software to users. Launchpad, the Snap Store, and the Juju Charm Store provide a way to contact publishers. As per the terms and conditions for these services, publishers are solely responsible for support of their software. If you believe any of these services are being used to host or distribute malicious software, this can be reported either to the Ubuntu Security team or to the relevant platform as appropriate. -

-

- Ubuntu and Canonical software is distributed through many channels: Canonical-operated download sites, public cloud providers, and community-operated mirrors. Sometimes security issues may be due to customizations at specific providers or distributors; in which case we may ask reporters to contact another party for support. -

-

- Out of scope -

-

- We will not issue CVEs or fixes for software that is no longer supported. Please check if found issues affect supported versions of software. -

-

- Not all bugs are vulnerabilities. We use a common understanding of Internet-connected multi-user computers where some of the user accounts may have privileges. Because of this, our idea of what constitutes a vulnerability may not match definitions used by other organizations. We cannot promise every issue reported to us as a security vulnerability will be handled as one; when we differ, we will endeavor to explain our reasoning. -

-

- What to expect from us -

-

- We intend to provide an initial response to reporters within two business days. -

-

- The Ubuntu Security Team can assign CVE numbers for issues in Canonical software, as well as anything shipped in Ubuntu. We may direct the reporter to use cveform.mitre.org for publicly known issues in non-Canonical software to avoid duplicate assignments. -

-

- For issues that are not yet publicly known, we will abide by any embargoes as necessary. We reserve the right to release fixes before an embargo has expired if other parties disclose the issue before the agreed upon embargo date or if there is evidence of abuse. -

-

- We may or may not provide further information to reporters about similar issues. We may or may not ask reporters to collaborate on solutions or work-arounds. We may or may not ask reporters for assistance testing solutions or work-arounds. -

-

- We are not affiliated with any bug bounty programs. We do not ourselves pay for bug reports, in either our software or our infrastructure. -

-

- We are happy to give credit to reporters in our CVE assignments and in our Ubuntu Security Notices. We will use known identities of discoverers, with no affiliations, in our USNs. -

-

- Disclosure timelines -

-

- When we assign a CVE, we intend to publish CVE details within one week after we provide update notifications or release new versions of software. We may publish CVE details before we provide fixes. Reporters are free to prepare whatever content they wish. We would like exploits and proof of concept exploits to be held private for at least one week after fixes are published to allow our users adequate time to test and install updates before exploits are easily available. -

-

- Safe harbour -

-

- Ubuntu is proudly built on the contributions of thousands and our security is no exception. We welcome responsible research into the security of our software to make Ubuntu and Canonical software secure for everyone. -

-

- However, we do not welcome active security probing of Canonical or Ubuntu infrastructure and services. If you believe you have found a security issue in Canonical or Ubuntu infrastructure or services please contact us. -

+
+
+
+
+

How to report an issue to us

+
-
-
+
+
+
    +
  1. +
    +
    +

    Launchpad.net bug reporting interface

    +
    +
    +

    + You may report issues to the Ubuntu Security Team via the Launchpad.net bug reporting interface. This is the most convenient way to get to the bug reporting form. Please be aware that Launchpad.net will send email in plaintext in response to bug reports. +

    +
    ubuntu-bug <packagename>
    +
    +
    +
  2. +
  3. +
    +
    +

    Email

    +
    +
    +

    + You may also send email to security@ubuntu.com. Email may optionally be encrypted to: +

    +
    OpenPGP key 4072 60F7 616E CE4D 9D12 4627 98E9 740D C345 39E0:
    +https://keyserver.ubuntu.com/pks/lookup?
    +op=get&search=0x407260f7616ece4d9d12462798e9740dc34539e0
    +
    +
    +
  4. +
+

If you have a deadline for public disclosure, please let us know.

+
+
+
+ +
+
+
+
+

Scope

+
+
+

+ Ubuntu is built on the contributions of thousands of projects. Usually issues that affect Ubuntu will affect other projects and other Linux distributions. Sometimes we may ask reporters to contact upstream developers. +

+

+ The Ubuntu distribution is divided into multiple pockets: main, universe, restricted, and multiverse. Packages in main are supported by the Ubuntu Security Team. Packages in universe and multiverse are supported by the community; the Ubuntu Security Team can sponsor fixes prepared and tested by community members. +

+

+ Packages in restricted are supported by Canonical's business partners. The Ubuntu Security Team can coordinate with our partners. +

+

+ Software written by Canonical, but delivered outside of Ubuntu, is supported by different teams at Canonical. The Ubuntu Security Team is happy to coordinate communication between external entities (i.e. analysts, reporters) and supporting teams within Canonical, as well as provide guidance and feedback. +

+

+ The Canonical Launchpad code hosting service, Canonical Snap Store, and Canonical Juju Charm Store allows anyone to publish software to users. Launchpad, the Snap Store, and the Juju Charm Store provide a way to contact publishers. As per the terms and conditions for these services, publishers are solely responsible for support of their software. If you believe any of these services are being used to host or distribute malicious software, this can be reported either to the Ubuntu Security team or to the relevant platform as appropriate. +

+

+ Ubuntu and Canonical software is distributed through many channels: Canonical-operated download sites, public cloud providers, and community-operated mirrors. Sometimes security issues may be due to customizations at specific providers or distributors; in which case we may ask reporters to contact another party for support. +

+
+
+
+
+
+
+
+

Out of scope

+
+
+

+ We will not issue CVEs or fixes for software that is no longer supported. Please check if found issues affect supported versions of software. +

+

+ Not all bugs are vulnerabilities. We use a common understanding of Internet-connected multi-user computers where some of the user accounts may have privileges. Because of this, our idea of what constitutes a vulnerability may not match definitions used by other organizations. We cannot promise every issue reported to us as a security vulnerability will be handled as one; when we differ, we will endeavor to explain our reasoning. +

+
+
+
+ +
+
+
+
+

What to expect from us

+
+
+

We intend to provide an initial response to reporters within two business days.

+

+ The Ubuntu Security Team can assign CVE numbers for issues in Canonical software, as well as anything shipped in Ubuntu. We may direct the reporter to use cveform.mitre.org for publicly known issues in non-Canonical software to avoid duplicate assignments. +

+

+ For issues that are not yet publicly known, we will abide by any embargoes as necessary. We reserve the right to release fixes before an embargo has expired if other parties disclose the issue before the agreed upon embargo date or if there is evidence of abuse. +

+

+ We may or may not provide further information to reporters about similar issues. We may or may not ask reporters to collaborate on solutions or work-arounds. We may or may not ask reporters for assistance testing solutions or work-arounds. +

+

+ We are not affiliated with any bug bounty programs. We do not ourselves pay for bug reports, in either our software or our infrastructure. +

+

+ We are happy to give credit to reporters in our CVE assignments and in our Ubuntu Security Notices. We will use known identities of discoverers, with no affiliations, in our USNs. +

+
+
+
+
+ {{ image(url="https://assets.ubuntu.com/v1/1af4bfae-What%20to%20expect%20from%20us.png", + alt="", + width="2464", + height="1027", + hi_def=True, + loading="auto", + attrs={"class": "p-image-container__image"}) | safe + }} +
+
+
+ +
+
+
+
+

Disclosure timelines

+
+
+

+ When we assign a CVE, we intend to publish CVE details within one week after we provide update notifications or release new versions of software. We may publish CVE details before we provide fixes. Reporters are free to prepare whatever content they wish. We would like exploits and proof of concept exploits to be held private for at least one week after fixes are published to allow our users adequate time to test and install updates before exploits are easily available. +

+
+
+
+ +
+
+
+
+

Safe harbour

+
+
+

+ Ubuntu is proudly built on the contributions of thousands and our security is no exception. We welcome responsible research into the security of our software to make Ubuntu and Canonical software secure for everyone. +

+

+ However, we do not welcome active security probing of Canonical or Ubuntu infrastructure and services. If you believe you have found a security issue in Canonical or Ubuntu infrastructure or services please contact us. +

+
+
+
- {% endblock content %} +{% endblock content %} From 101a0595a69822bdca2ae2b6b941cbb2284de8e3 Mon Sep 17 00:00:00 2001 From: MariaPaula Trujillo Date: Thu, 6 Feb 2025 16:11:37 +0100 Subject: [PATCH 15/31] Apply design fix --- templates/security/disclosure-policy.html | 46 ++++++++++++----------- 1 file changed, 24 insertions(+), 22 deletions(-) diff --git a/templates/security/disclosure-policy.html b/templates/security/disclosure-policy.html index 929480aca18..9ef09b72af3 100644 --- a/templates/security/disclosure-policy.html +++ b/templates/security/disclosure-policy.html @@ -156,28 +156,30 @@

Out of scope

-
-
-
-

What to expect from us

-
-
-

We intend to provide an initial response to reporters within two business days.

-

- The Ubuntu Security Team can assign CVE numbers for issues in Canonical software, as well as anything shipped in Ubuntu. We may direct the reporter to use cveform.mitre.org for publicly known issues in non-Canonical software to avoid duplicate assignments. -

-

- For issues that are not yet publicly known, we will abide by any embargoes as necessary. We reserve the right to release fixes before an embargo has expired if other parties disclose the issue before the agreed upon embargo date or if there is evidence of abuse. -

-

- We may or may not provide further information to reporters about similar issues. We may or may not ask reporters to collaborate on solutions or work-arounds. We may or may not ask reporters for assistance testing solutions or work-arounds. -

-

- We are not affiliated with any bug bounty programs. We do not ourselves pay for bug reports, in either our software or our infrastructure. -

-

- We are happy to give credit to reporters in our CVE assignments and in our Ubuntu Security Notices. We will use known identities of discoverers, with no affiliations, in our USNs. -

+
+
+
+
+

What to expect from us

+
+
+

We intend to provide an initial response to reporters within two business days.

+

+ The Ubuntu Security Team can assign CVE numbers for issues in Canonical software, as well as anything shipped in Ubuntu. We may direct the reporter to use cveform.mitre.org for publicly known issues in non-Canonical software to avoid duplicate assignments. +

+

+ For issues that are not yet publicly known, we will abide by any embargoes as necessary. We reserve the right to release fixes before an embargo has expired if other parties disclose the issue before the agreed upon embargo date or if there is evidence of abuse. +

+

+ We may or may not provide further information to reporters about similar issues. We may or may not ask reporters to collaborate on solutions or work-arounds. We may or may not ask reporters for assistance testing solutions or work-arounds. +

+

+ We are not affiliated with any bug bounty programs. We do not ourselves pay for bug reports, in either our software or our infrastructure. +

+

+ We are happy to give credit to reporters in our CVE assignments and in our Ubuntu Security Notices. We will use known identities of discoverers, with no affiliations, in our USNs. +

+
From 767c8317fa71c07dfd951b896075f796adabde80 Mon Sep 17 00:00:00 2001 From: MariaPaula Trujillo Date: Fri, 7 Feb 2025 10:49:53 +0100 Subject: [PATCH 16/31] Update copy --- templates/security/disclosure-policy.html | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/templates/security/disclosure-policy.html b/templates/security/disclosure-policy.html index 9ef09b72af3..cdab802d69a 100644 --- a/templates/security/disclosure-policy.html +++ b/templates/security/disclosure-policy.html @@ -189,7 +189,7 @@

What to expect from us

width="2464", height="1027", hi_def=True, - loading="auto", + loading="lazy", attrs={"class": "p-image-container__image"}) | safe }}
@@ -214,7 +214,7 @@

Disclosure timelines


-

Safe harbour

+

Safe harbor

From ff26db9b97f76640a19b19e40ee720d8ad099869 Mon Sep 17 00:00:00 2001 From: MariaPaula Trujillo Date: Fri, 7 Feb 2025 16:21:20 +0100 Subject: [PATCH 17/31] Update templates/security/disclosure-policy.html Co-authored-by: Muhammad Ali --- templates/security/disclosure-policy.html | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/templates/security/disclosure-policy.html b/templates/security/disclosure-policy.html index cdab802d69a..2611ee6842c 100644 --- a/templates/security/disclosure-policy.html +++ b/templates/security/disclosure-policy.html @@ -123,7 +123,7 @@

Scope

The Ubuntu distribution is divided into multiple pockets: main, universe, restricted, and multiverse. Packages in main are supported by the Ubuntu Security Team. Packages in universe and multiverse are supported by the community; the Ubuntu Security Team can sponsor fixes prepared and tested by community members.

- Packages in restricted are supported by Canonical's business partners. The Ubuntu Security Team can coordinate with our partners. + Packages in restricted are supported by Canonical's business partners. The Ubuntu Security Team can coordinate fixes with our partners.

Software written by Canonical, but delivered outside of Ubuntu, is supported by different teams at Canonical. The Ubuntu Security Team is happy to coordinate communication between external entities (i.e. analysts, reporters) and supporting teams within Canonical, as well as provide guidance and feedback. From a00632001fa187008253b76628bde5521f2b839a Mon Sep 17 00:00:00 2001 From: MariaPaula Trujillo Date: Fri, 7 Feb 2025 16:21:26 +0100 Subject: [PATCH 18/31] Update templates/security/disclosure-policy.html Co-authored-by: Muhammad Ali --- templates/security/disclosure-policy.html | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/templates/security/disclosure-policy.html b/templates/security/disclosure-policy.html index 2611ee6842c..1696d5985b0 100644 --- a/templates/security/disclosure-policy.html +++ b/templates/security/disclosure-policy.html @@ -177,7 +177,7 @@

What to expect from us

We are not affiliated with any bug bounty programs. We do not ourselves pay for bug reports, in either our software or our infrastructure.

- We are happy to give credit to reporters in our CVE assignments and in our Ubuntu Security Notices. We will use known identities of discoverers, with no affiliations, in our USNs. + We are happy to give credit to reporters in our CVE assignments and in our Ubuntu Security Notices. We will use real names of discoverers, with no affiliations, in our USNs.

From 9ff57125beda0012a5c2b8fcf2256456a724d956 Mon Sep 17 00:00:00 2001 From: Britney Wang Date: Mon, 10 Feb 2025 16:52:27 +0800 Subject: [PATCH 19/31] Rebrand /security/docker-images --- templates/security/docker-images.html | 387 +++++++++++++++++--------- 1 file changed, 257 insertions(+), 130 deletions(-) diff --git a/templates/security/docker-images.html b/templates/security/docker-images.html index 273af0b276c..38603a6e8cd 100644 --- a/templates/security/docker-images.html +++ b/templates/security/docker-images.html @@ -1,151 +1,278 @@ {% extends "security/base_security.html" %} +{% from "_macros/vf_hero.jinja" import vf_hero %} +{% from "_macros/vf_rich-vertical-list.jinja" import vf_rich_vertical_list %} +{% from "_macros/vf_tiered-list.jinja" import vf_tiered_list %} + {% block title %}LTS Docker Images{% endblock %} -{% block meta_description %}The LTS Docker Image Portfolio on Docker Hub and public cloud container registries provides compliant, secure application images, with a long term maintenance commitment by Canonical.{% endblock meta_description %} +{% block meta_description %} + The LTS Docker Image Portfolio on Docker Hub and public cloud container registries provides compliant, secure application images, with a long term maintenance commitment by Canonical. +{% endblock meta_description %} -{% block meta_copydoc %}https://docs.google.com/document/d/1zZibtjU141e4mBxo_0PtfYxJ6e5fyaaAdFZ6v945XAM/edit{% endblock meta_copydoc %} +{% block meta_copydoc %} + https://docs.google.com/document/d/1zZibtjU141e4mBxo_0PtfYxJ6e5fyaaAdFZ6v945XAM/edit +{% endblock meta_copydoc %} {% block content %} - -
-
-
-

Long Term Supported
OCI Images

-

Hardened container images, with stable tracks from development to production. Up to ten years guaranteed security maintenance from Canonical's trusted repositories.

-

$ docker pull ubuntu/nginx

+ {% call(slot) vf_hero( + title_text='Long Term Supported OCI Images', + layout='50/50-full-width-image' + ) -%} + {%- if slot == 'description' -%}

- Get commercial support - Explore the images › + Hardened container images, with stable tracks from development to production. Up to ten years guaranteed security maintenance from Canonical's trusted repositories.

+ {%- endif -%} + {%- if slot == 'cta' -%} + Get commercial support + Explore the images › + {%- endif -%} + {%- if slot == 'image' -%} +
+ {{ image(url="https://assets.ubuntu.com/v1/6faa08d1-hero.png", + alt="", + width="2464", + height="1028", + hi_def=True, + loading="auto", + attrs={"class": "p-image-container__image"}) | safe + }} +
+ {% endif -%} + {% endcall -%} + +
+
+
+
+

Critical CVE fixes in 24 hours

+
+
+

+ Scanning container images for vulnerabilities is now widespread, but fixing them requires dedicated skills and infrastructure. Trusted provenance is key. +

+

+ The LTS Docker Image Portfolio provides ready-to-use application base images, free of high and critical CVEs. Images are built on the same secure infrastructure that builds Ubuntu, and updated automatically when apps or dependencies are fixed. +

+ +
-
- {{ - image( - url="https://assets.ubuntu.com/v1/25c42877-simplified-software-management-2.svg", - alt="", - height="220", - width="220", - hi_def=True, - loading="auto", - ) | safe - }} -
-
-
- -
-
-
- {{ - image( - url="https://assets.ubuntu.com/v1/50dea393-fixes+in+24hrs.svg", - alt="", - height="210", - width="210", - hi_def=True, - loading="auto", - ) | safe - }} -
-
-

Critical CVE fixes in 24 hours

-

Scanning container images for vulnerabilities is now widespread, but fixing them requires dedicated skills and infrastructure. Trusted provenance is key.

-

The LTS Docker Image Portfolio provides ready-to-use application base images, free of high and critical CVEs. Images are built on the same secure infrastructure that builds Ubuntu, and updated automatically when apps or dependencies are fixed.

- Explore our CVE-fixing track record › -
-
-
- -
-
-

Our Commitment

-
    -
  • Minimum 5 years of 24/7 security updates from Canonical
  • -
  • Fixes for high and critical Common Vulnerabilities and Exposures (CVEs)
  • -
  • The Ubuntu distribution base image and application layers
  • -
  • All major architectures
  • -
  • Designed for layering - "FROM public.ecr.aws/lts/mysql"
  • -
-

+

+ + {% call(slot) vf_rich_vertical_list( + title_text="Our Commitment", + list_item_tick_style="tick", + is_flipped=true + ) -%} + + {%- if slot == 'image' -%} +
+ {{ image(url="https://assets.ubuntu.com/v1/4dcb1735-our-commitment.png", + alt="", + width="1200", + height="1801", + hi_def=True, + loading="lazy", + attrs={"class": "p-image-container__image"}) | safe + }} +
+ {%- endif -%} + {%- if slot == 'description' -%} +

+ Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna + aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate. +

+ {%- endif -%} + {%- if slot == 'list_item_1' -%} + Minimum 5 years of 24/7 security updates from Canonical + {%- endif -%} + {%- if slot == 'list_item_2' -%} + Fixes for high and critical Common Vulnerabilities and Exposures (CVEs) + {%- endif -%} + {%- if slot == 'list_item_3' -%} + The Ubuntu distribution base image and application layers + {%- endif -%} + {%- if slot == 'list_item_4' -%} + All major architectures + {%- endif -%} + {%- if slot == 'list_item_5' -%} + Designed for layering - "FROM public.ecr.aws/lts/mysql" + {%- endif -%} + {%- if slot == 'cta' -%} Learn more about the Ubuntu release cadence › -

-
-
- -
-
-
- {{ image(url="https://assets.ubuntu.com/v1/8b0a474a-Microsoft_.NET_logo.svg", - alt="Microsft .NET logo", - width="230", - height="230", - hi_def=True, - loading="auto") | safe }} -
-
-

Use case: Building .NET apps on Ubuntu LTS

-

Getting started with .NET on Ubuntu is straightforward and efficient with Canonical-maintained ultra-small container images. Developers now have production-grade container images to ship their .NET apps on Ubuntu. Predictable release cadence aligned with Ubuntu LTS and .NET LTS releases guarantees security and stability, long-term. Security patches and support are available to Ubuntu Ppro customers, including on the Microsoft Azure platform.

- Read about .NET support on Ubuntu › + {%- endif -%} + {% endcall -%} + +
+
+
+
+

+ Use case: +
+ Building .NET apps on Ubuntu LTS +

+
+
+
+
+ {{ image(url="https://assets.ubuntu.com/v1/98571792-net.png", + alt="Microsft .NET logo", + width="1200", + height="801", + hi_def=True, + loading="lazy") | safe + }} +
+
+

+ Getting started with .NET on Ubuntu is straightforward and efficient with Canonical-maintained ultra-small container images. +

+

+ Developers now have production-grade container images to ship their .NET apps on Ubuntu. Predictable release cadence aligned with Ubuntu LTS and .NET LTS releases guarantees security and stability, long-term. Security patches and support are available to Ubuntu Ppro customers, including on the Microsoft Azure platform. +

+ +
-
-
- -
-
-

FAQ on the LTS Docker Image Portfolio

-

Where are the images?

-

On Amazon ECR Public and Docker Hub, images are provided in three groups:

-
    -
  • Ubuntu on Docker Hub and ECR Public have development releases with security updates
  • -
  • LTS ("Canonical") on ECR Public has Free LTS images with up to five years fixes
  • -
  • Customer-only content with up to ten years of fixes. Contact us.
  • -
-

All of our Docker Hub repositories are exempted from per-user rate limits.

-

Are these Official Images on Docker Hub?

-

Several images from the Canonical LTS Docker Image Portfolio are free Docker Official Image versions during their five year standard security maintenance period. The Ubuntu base image is available both as an official image on Docker hub and through the LTS and Ubuntu namespaces on Amazon ECR Public.

-

Is the LTS Docker Image Portfolio a free or a commercial offering?

-

Both. Some LTS Docker Images have a free five year maintenance period, based on the underlying Ubuntu LTS free standard security maintenance period. After five years, these LTS images will get five more years of security patches through the Expanded Security Maintenance (ESM) program. The ESM program is available with our Ubuntu Pro subscriptions. Some images don't get the free five initial LTS years, but still are eligible for the 10-year ESM program. On each image's documentation, the support dates and LTS/ESM logos indicate the current support status for every version. As with Ubuntu interim releases, ongoing development images are released regularly and receive free security updates while they are the current version. Read more.

- -

Is there a long-term commitment? How long?

-

ESM Images are security-maintained for the full ten year period of their underlying Ubuntu LTS release. Some applications will have versions on multiple Ubuntu LTS versions. In each case, the image is maintained for the full life of the underlying Ubuntu LTS.

-

Can I use these images to build other applications?

-

Yes. Our hardened images are optimised for the developer experience, layering, and minimality. Each image is engineered to be clean, without layering artefacts, making it an ideal foundation for enterprise continuous integration and golden images. If you are an ISV, Canonical can offer embedded terms for redistribution and specific support. Get in touch.

-

Can I enable FIPS mode on Ubuntu-based container images?

-

Yes, with a valid Ubuntu Pro subscription. Hosts or nodes running the hardened Ubuntu-based container images must be covered with Ubuntu Pro subscriptions. You can read more about how to enable FIPS mode on container images in this blog post.

-
-
- -
-
-
- {{ - image( - url="https://assets.ubuntu.com/v1/407cbd49-canonical-cloud.svg", - alt="", - height="150", - width="230", - hi_def=True, - loading="lazy", - ) | safe +
+ +
+ {%- call(slot) vf_tiered_list(is_description_full_width_on_desktop=true) -%} + {%- if slot == 'title' -%} +

FAQ on the LTS Docker Image Portfolio

+ {%- endif -%} + + {%- if slot == 'list_item_title_1' -%} +

Where are the images?

+ {%- endif -%} + {%- if slot == 'list_item_description_1' -%} +

On Amazon ECR Public and Docker Hub, images are provided in three groups:

+
+
    +
  • + Ubuntu on Docker Hub and ECR Public have development releases with security updates +
  • +
  • + LTS ("Canonical") on ECR Public has Free LTS images with up to five years fixes +
  • +
  • + Customer-only content with up to ten years of fixes. Contact us. +
  • +
+
+

All of our Docker Hub repositories are exempted from per-user rate limits.

+ {%- endif -%} + + {%- if slot == 'list_item_title_2' -%} +

+ Are these Official Images +
+ on Docker Hub? +

+ {%- endif -%} + {%- if slot == 'list_item_description_2' -%} +

+ Several images from the Canonical LTS Docker Image Portfolio are free Docker Official Image versions during their five year standard security maintenance period. The Ubuntu base image is available both as an official image on Docker hub and through the LTS and Ubuntu namespaces on Amazon ECR Public. +

+ {%- endif -%} + + {%- if slot == 'list_item_title_3' -%} +

Is the LTS Docker Image Portfolio a free or a commercial offering?

+ {%- endif -%} + {%- if slot == 'list_item_description_3' -%} +

+ Both. Some LTS Docker Images have a free five year maintenance period, based on the underlying Ubuntu LTS free standard security maintenance period. After five years, these LTS images will get five more years of security patches through the Expanded Security Maintenance (ESM) program. The ESM program is available with our Ubuntu Pro subscriptions. Some images don't get the free five initial LTS years, + but still are eligible for the 10-year ESM program. On each image's documentation, the support dates and LTS/ESM logos indicate the current support status for every version. As with Ubuntu interim releases, ongoing development images are released regularly and receive free security updates while they are the current version. +

+
+

+ Read more › +

+ {%- endif -%} + + {%- if slot == 'list_item_title_4' -%} +

Is there a long-term commitment? How long?

+ {%- endif -%} + {%- if slot == 'list_item_description_4' -%} +

+ ESM Images are security-maintained for the full ten year period of their underlying Ubuntu LTS release. Some applications will have versions on multiple Ubuntu LTS versions. In each case, the image is maintained for the full life of the underlying Ubuntu LTS. +

+ {%- endif -%} + + {%- if slot == 'list_item_title_5' -%} +

Can I use these images to build other applications?

+ {%- endif -%} + {%- if slot == 'list_item_description_5' -%} +

+ Yes. Our hardened images are optimised for the developer experience, layering, and minimality. Each image is engineered to be clean, without layering artefacts, making it an ideal foundation for enterprise continuous integration and golden images. If you are an ISV, Canonical can offer embedded terms for redistribution and specific support. +

+
+

+ Get in touch › +

+ {%- endif -%} + + {%- if slot == 'list_item_title_6' -%} +

Can I enable FIPS mode on Ubuntu-based container images?

+ {%- endif -%} + {%- if slot == 'list_item_description_6' -%} +

+ Yes, with a valid Ubuntu Pro subscription. Hosts or nodes running the hardened Ubuntu-based container images must be covered with Ubuntu Pro subscriptions. You can read more about how to enable FIPS mode on container images in this blog post. +

+ {%- endif -%} + {% endcall -%} +
+ +
+
+ {{ image(url="https://assets.ubuntu.com/v1/f50399ab-secure-your-cloud.png", + alt="", + width="2464", + height="1028", + hi_def=True, + loading="lazy", + attrs={"class": "p-image-container__image"}) | safe }}
-
-
+ +
+ +
+
+
+

Secure your cloud solutions

-

Would you like to discuss your specific use case with us? Our team is here to help you secure your cloud solutions, starting with secure Docker images.

+
+

- Get in touch + Would you like to discuss your specific use case with us? Our team is here to help you secure your cloud solutions, starting with secure Docker images. +

+
+

+ Get in touch

-
-
- -{% with first_item="_support_landscape", second_item="_support_contact_us", third_item="_further_reading" %}{% include "shared/contextual_footers/_contextual_footer.html" %}{% endwith %} +
- -
- + +
+ {% endblock content %} -{% block footer_extra %}{{ marketo }}{% endblock footer_extra %} + +{% block footer_extra %} + {{ marketo }} +{% endblock footer_extra %} From 351449c40298b74667b44af351b113035128425a Mon Sep 17 00:00:00 2001 From: Britney Wang Date: Mon, 10 Feb 2025 17:29:26 +0800 Subject: [PATCH 20/31] Apply design comment suggestions --- templates/security/docker-images.html | 12 +++--------- 1 file changed, 3 insertions(+), 9 deletions(-) diff --git a/templates/security/docker-images.html b/templates/security/docker-images.html index 38603a6e8cd..bece675f649 100644 --- a/templates/security/docker-images.html +++ b/templates/security/docker-images.html @@ -81,12 +81,6 @@

Critical CVE fixes in 24 hours

}}
{%- endif -%} - {%- if slot == 'description' -%} -

- Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna - aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate. -

- {%- endif -%} {%- if slot == 'list_item_1' -%} Minimum 5 years of 24/7 security updates from Canonical {%- endif -%} @@ -183,7 +177,7 @@

{%- endif -%} {%- if slot == 'list_item_title_3' -%} -

Is the LTS Docker Image Portfolio a free or a commercial offering?

+

Is the LTS Docker Image Portfolio
a free or a commercial offering?

{%- endif -%} {%- if slot == 'list_item_description_3' -%}

@@ -206,7 +200,7 @@

Is there a long-term commitment? How long?

{%- endif -%} {%- if slot == 'list_item_title_5' -%} -

Can I use these images to build other applications?

+

Can I use these images
to build other applications?

{%- endif -%} {%- if slot == 'list_item_description_5' -%}

@@ -219,7 +213,7 @@

Can I use these images to build other applications?

Can I enable FIPS mode on Ubuntu-based container images? +

Can I enable FIPS mode
on Ubuntu-based container images?

{%- endif -%} {%- if slot == 'list_item_description_6' -%}

From 2271c821d4cdccc0aa52aed8fe65164574d95f87 Mon Sep 17 00:00:00 2001 From: Britney Wang Date: Mon, 10 Feb 2025 18:19:26 +0800 Subject: [PATCH 21/31] Add missing blog link --- templates/security/docker-images.html | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/templates/security/docker-images.html b/templates/security/docker-images.html index bece675f649..41d3f915dcf 100644 --- a/templates/security/docker-images.html +++ b/templates/security/docker-images.html @@ -197,6 +197,10 @@

Is there a long-term commitment? How long?

ESM Images are security-maintained for the full ten year period of their underlying Ubuntu LTS release. Some applications will have versions on multiple Ubuntu LTS versions. In each case, the image is maintained for the full life of the underlying Ubuntu LTS.

+
+

+ Read more › +

{%- endif -%} {%- if slot == 'list_item_title_5' -%} From 4e3ae7c09207ace9bd48afed306e9f952d336577 Mon Sep 17 00:00:00 2001 From: Britney Wang Date: Tue, 11 Feb 2025 11:46:03 +0800 Subject: [PATCH 22/31] Replace forms with form template --- templates/security/docker-images.html | 11 +- templates/security/form-data.json | 300 ++++++++++++++++++++++++++ 2 files changed, 302 insertions(+), 9 deletions(-) diff --git a/templates/security/docker-images.html b/templates/security/docker-images.html index 41d3f915dcf..38703e38462 100644 --- a/templates/security/docker-images.html +++ b/templates/security/docker-images.html @@ -260,15 +260,8 @@

Secure your cloud solutions

- -
- + {% include "/shared/forms/form-template.html" %} + {% endblock content %} {% block footer_extra %} diff --git a/templates/security/form-data.json b/templates/security/form-data.json index e29e0678973..2c127642c59 100644 --- a/templates/security/form-data.json +++ b/templates/security/form-data.json @@ -368,6 +368,306 @@ ] } ] + }, + "/security/docker-images": { + "templatePath": "/security/docker-images.html", + "isModal": true, + "modalId": "contact-modal", + "formData": { + "title": "Secure and stable OCI images", + "introText": "Canonical supports container images for Ubuntu and many open source applications. We empower developers with a consistent developer experience from hosts to containers. We cover enterprises with up to 10-year security patches. This short survey will help us bring the right team to start a meaningful conversation.", + "formId": "3785", + "returnUrl": "/security/docker-images#contact-form-success", + "lpUrl": "https://ubuntu.com/security/contact-us?product=docker", + "product": "" + }, + "fieldsets": [ + { + "title": "What do you value the most in container images?", + "id": "value-container-images", + "inputType": "checkbox", + "fields": [ + { + "type": "checkbox", + "id": "value-minimal-size", + "value": "Minimal size", + "label": "Minimal size" + }, + { + "type": "checkbox", + "id": "value-technical-support", + "value": "Technical support", + "label": "Technical support" + }, + { + "type": "checkbox", + "id": "value-direct-pull-access", + "value": "Direct pull access", + "label": "Direct pull access" + }, + { + "type": "checkbox", + "id": "value-long-term-versions", + "value": "Long-term versions", + "label": "Long-term versions" + }, + { + "type": "checkbox", + "id": "value-developer-experience", + "value": "Developer experience", + "label": "Developer experience" + }, + { + "type": "checkbox", + "id": "value-free-of-vulnerability", + "value": "Free of vulnerability", + "label": "Free of vulnerability" + }, + { + "type": "checkbox", + "id": "value-trusted-provenance", + "value": "Trusted provenance", + "label": "Trusted provenance" + }, + { + "type": "checkbox", + "id": "value-compliance", + "value": "Compliance (FIPS, CIS hardening...)", + "label": "Compliance (FIPS, CIS hardening...)" + } + ] + }, + { + "title": "What applications would you like as prebuilt images?", + "id": "apps-prebuild-images", + "inputType": "checkbox", + "fields": [ + { + "type": "checkbox", + "id": "applications-NGINX", + "value": "NGINX", + "label": "NGINX" + }, + { + "type": "checkbox", + "id": "applications-Apache", + "value": "Apache", + "label": "Apache" + }, + { + "type": "checkbox", + "id": "applications-Redis", + "value": "Redis", + "label": "Redis" + }, + { + "type": "checkbox", + "id": "applications-MySQL", + "value": "MySQL", + "label": "MySQL" + }, + { + "type": "checkbox", + "id": "applications-PostgreSQL", + "value": "PostgreSQL", + "label": "PostgreSQL" + }, + { + "type": "checkbox", + "id": "applications-other-databases", + "value": "Other databases", + "label": "Other databases" + }, + { + "type": "checkbox", + "id": "applications-NodeJS", + "value": "NodeJS", + "label": "NodeJS" + }, + { + "type": "checkbox", + "id": "applications-Python", + "value": "Python", + "label": "Python" + }, + { + "type": "checkbox", + "id": "applications-dot-net", + "value": ".NET", + "label": ".NET" + }, + { + "type": "checkbox", + "id": "applications-Java", + "value": "Java (OpenJDK)", + "label": "Java (OpenJDK)" + }, + { + "type": "checkbox", + "id": "applications-distroless-images", + "value": "Distroless images", + "label": "Distroless images" + }, + { + "type": "checkbox", + "id": "applications-other-runtimes", + "value": "Other runtimes", + "label": "Other runtimes" + }, + { + "type": "checkbox", + "id": "applications-Cassandra", + "value": "Cassandra", + "label": "Cassandra" + }, + { + "type": "checkbox", + "id": "applications-Grafana", + "value": "Grafana", + "label": "Grafana" + }, + { + "type": "checkbox", + "id": "applications-Prometheus", + "value": "Prometheus", + "label": "Prometheus" + }, + { + "type": "checkbox", + "id": "applications-Memcached", + "value": "Memcached", + "label": "Memcached" + }, + { + "type": "checkbox", + "id": "applications-other", + "value": "Others", + "label": "Others" + } + ] + }, + { + "title": "What best describes your use case?", + "id": "use-case", + "inputType": "checkbox", + "fields": [ + { + "type": "checkbox", + "id": "use-case-Public-Cloud", + "value": "Public Cloud", + "label": "Public Cloud" + }, + { + "type": "checkbox", + "id": "use-case-Kubernetes", + "value": "Kubernetes", + "label": "Kubernetes" + }, + { + "type": "checkbox", + "id": "use-case-CI-CD", + "value": "CI/CD", + "label": "CI/CD" + }, + { + "type": "checkbox", + "id": "use-case-Multi-stage-builds", + "value": "Multi stage builds", + "label": "Multi stage builds" + }, + { + "type": "checkbox", + "id": "use-case-Private-Cloud", + "value": "Private Cloud", + "label": "Private Cloud" + }, + { + "type": "checkbox", + "id": "use-case-Docker-Swarm", + "value": "Docker Swarm", + "label": "Docker Swarm" + }, + { + "type": "checkbox", + "id": "use-case-Custom-Business-Apps", + "value": "Custom Business Apps", + "label": "Custom Business Apps" + }, + { + "type": "checkbox", + "id": "use-case-Edge-computing", + "value": "Edge computing", + "label": "Edge computing" + }, + { + "type": "checkbox", + "id": "use-case-CaaS-PaaS", + "value": "CaaS/PaaS", + "label": "CaaS/PaaS" + }, + { + "type": "checkbox", + "id": "use-case-Other-Kubernetes", + "value": "Other Kubernetes", + "label": "Other Kubernetes" + }, + { + "type": "checkbox", + "id": "use-case-Restricted-Network", + "value": "Restricted Network (Firewall)", + "label": "Restricted Network (Firewall)" + }, + { + "type": "checkbox", + "id": "use-case-AI-ML", + "value": "AI/ML", + "label": "AI/ML" + } + ] + }, + { + "title": "Anything more that would help us bring the right team?", + "id": "summarize-your-applications-ummarize in a few words your applications-u're looking for?", + "fields": [ + { + "type": "long-text", + "id": "summarize-your-applications-ummarize in a few words your applications-u're looking for?", + "label": "summarize-your-applications-ummarize in a few words your applications-u're looking for?" + } + ] + }, + { + "title": "How should we get in touch?", + "id": "about-you", + "noCommentsFromLead": true, + "fields": [ + { + "type": "text", + "id": "firstName", + "label": "First name", + "isRequired": true + }, + { + "type": "text", + "id": "lastName", + "label": "Last name", + "isRequired": true + }, + { + "type": "email", + "id": "email", + "label": "Email address", + "isRequired": true + }, + { + "type": "tel", + "id": "phone", + "label": "Mobile/cell phone number", + "isRequired": true + } + ] + } + ] } } } \ No newline at end of file From 4e36f048ef3ed0c164dffe919216fefa799cb4ca Mon Sep 17 00:00:00 2001 From: Britney Wang Date: Tue, 11 Feb 2025 11:46:12 +0800 Subject: [PATCH 23/31] Remove unused interactive form --- .../forms/interactive/docker-images.html | 341 ------------------ 1 file changed, 341 deletions(-) delete mode 100644 templates/shared/forms/interactive/docker-images.html diff --git a/templates/shared/forms/interactive/docker-images.html b/templates/shared/forms/interactive/docker-images.html deleted file mode 100644 index 19874ba08fc..00000000000 --- a/templates/shared/forms/interactive/docker-images.html +++ /dev/null @@ -1,341 +0,0 @@ - From f6e8128c44bdd31b4d9fa9f636971c1d67218050 Mon Sep 17 00:00:00 2001 From: MariaPaula Trujillo Date: Mon, 10 Feb 2025 14:47:43 +0100 Subject: [PATCH 24/31] Apply redesign --- templates/security/cis.html | 346 ++++++++++++++++++++++++------------ 1 file changed, 236 insertions(+), 110 deletions(-) diff --git a/templates/security/cis.html b/templates/security/cis.html index ac43c396764..d2f0c184f5e 100644 --- a/templates/security/cis.html +++ b/templates/security/cis.html @@ -8,155 +8,281 @@ https://docs.google.com/document/d/1bSv8lV9BJoBYh5yog2eYKtvNMitKZetSSBQ3k2Cu5Cw/edit# {% endblock meta_copydoc %} +{% from "_macros/vf_hero.jinja" import vf_hero %} + +{% block body_class %} + is-paper +{% endblock body_class %} + {% block content %} -
-
-
-

CIS Benchmark on Ubuntu

-

Comply with the most widely accepted Linux baseline

-

- The CIS benchmark has hundreds of configuration recommendations, so hardening and auditing a Linux system or a kubernetes cluster manually can be very tedious. To drastically improve this process for enterprises, Canonical provides Ubuntu Security Guide (USG) for automated audit and compliance with the CIS benchmarks. Available with Ubuntu Pro on-premise or on public clouds. -

-

- Contact us - Get Ubuntu Pro -

+ {% call(slot) vf_hero( + title_text='CIS Benchmark on Ubuntu', + subtitle_text='Comply with the most widely accepted Linux baseline', + layout='25/75' + ) -%} + {%- if slot == 'signpost_image' -%} + {{ image(url="https://assets.ubuntu.com/v1/f98af83d-cis-logo-removebg-preview.png", + alt="", + width="144", + height="144", + hi_def=True, + loading="auto") | safe + }} + {%- endif -%} + {%- if slot == 'description' -%} +

+ The CIS benchmark has hundreds of configuration recommendations, so hardening and auditing a Linux system or a kubernetes cluster manually can be very tedious. To drastically improve this process for enterprises, Canonical provides Ubuntu Security Guide (USG) for automated audit and compliance with the CIS benchmarks. Available with Ubuntu Pro on-premise or on public clouds. +

+ {%- endif -%} + {%- if slot == 'cta' -%} + Contact us + Get Ubuntu Pro › + {%- endif -%} + {%- endcall -%} + +
+
+
+
+

What it includes

-
- {{ image ( - url="https://assets.ubuntu.com/v1/f98af83d-cis-logo-removebg-preview.png", - alt="", - width="300", - height="300", - hi_def=True, - loading="auto" - ) | safe - }} +
+
+
+
+
+
+
+
+ {{ image(url="https://assets.ubuntu.com/v1/cbc7c87d-Harden%20your%20Linux%20workloads.png", + alt="", + width="852", + height="1278", + hi_def=True, + loading="lazy", + attrs={"class": "p-image-container__image"}) | safe + }} +
+
+
+
+

Harden your Linux workloads

+
+

+ Hardening involves a tradeoff between security and usability. The default configuration of Ubuntu LTS releases, as provided by Canonical, balances between usability, performance and security. However, systems with a dedicated workload are well-positioned to benefit from hardening. Reduce your Linux workload’s attack surface with CIS hardened Ubuntu. +

+
+
+
+
+ + {{ image(url="https://assets.ubuntu.com/v1/e8fb4b4a-Automate%20your%20compliance.png", + alt="", + width="852", + height="1278", + hi_def=True, + loading="|lazy", + attrs={"class": "p-image-container__image"}) | safe + }} +
+
+
+
+

Automate your compliance

+
+

+ Applying a baseline with a large set of instructions manually is not only time consuming but also error-prone. According to Verizon data breach investigations report for 2021, misconfigurations were among the top five reasons for data breaches. Apply more than 250 rules in less than 15 minutes while avoiding misconfigurations using Ubuntu Security Guide that automates your CIS compliance. +

+
+
+
+
+ {{ image(url="https://assets.ubuntu.com/v1/04e37b30-Audit%20with%20Ubuntu%20Security%20Guide.png", + alt="", + width="852", + height="1278", + hi_def=True, + loading="lazy", + attrs={"class": "p-image-container__image"}) | safe + }} +
+
+
+
+

Audit with Ubuntu Security Guide

+
+

+ An important aspect of secure asset configuration for compliance is monitoring. You need to verify that systems comply with the selected baseline and contain operating system software supported by the vendor. Ubuntu Pro makes the Ubuntu Security Guide available to audit and monitor systems with the OpenSCAP tool. +

+
+
+
+
+
+
+
-
-
-
-

Harden your Linux workloads

-

- Hardening involves a tradeoff between security and usability. The default configuration of Ubuntu LTS releases, as provided by Canonical, balances between usability, performance and security. However, systems with a dedicated workload are well-positioned to benefit from hardening. Reduce your Linux workload’s attack surface with CIS hardened Ubuntu. -

-
-
-

Automate your compliance

+
+
+
+
+
+

Configure and apply CIS hardening rules in minutes

+

- Applying a baseline with a large set of instructions manually is not only time consuming but also error-prone. According to Verizon data breach investigations report for 2021, misconfigurations were among the top five reasons for data breaches. Apply more than 250 rules in less than 15 minutes while avoiding misconfigurations using Ubuntu Security Guide that automates your CIS compliance. + The compliance tooling has two objectives: it lets our customers harden their Ubuntu systems effortlessly and then quickly audit those systems against the published CIS Ubuntu benchmarks.

-
-

Audit with Ubuntu Security Guide

-

- An important aspect of secure asset configuration for compliance is monitoring. You need to verify that systems comply with the selected baseline and contain operating system software supported by the vendor. Ubuntu Pro makes the Ubuntu Security Guide available to audit and monitor systems with the OpenSCAP tool. -

+
+
+ +
-

- Get Ubuntu Pro - Learn more about Ubuntu Security Guide -

-
-
-
-

Configure and apply CIS hardening rules in minutes

+
+
+
+
+
+

+ Which versions +
+ of Ubuntu have CIS tooling? +

+
+
+

- The compliance tooling has two objectives: it lets our customers harden their Ubuntu systems effortlessly and then quickly audit those systems against the published CIS Ubuntu benchmarks. + Canonical provides OpenSCAP content for auditing systems for compliance with Center for Internet Security (CIS) benchmarks, as well as tooling to automate audit and compliance with the Ubuntu Security Guide.

+
    +
  • Ubuntu 22.04 LTS
  • +
  • Ubuntu 20.04 LTS
  • +
  • Ubuntu 18.04 LTS
  • +
  • Ubuntu 16.04 LTS
  • +
-
- +
+
+
-
-
-

Which versions of Ubuntu have CIS tooling?

-

- Canonical provides OpenSCAP content for auditing systems for compliance with Center for Internet Security (CIS) benchmarks, as well as tooling to automate audit and compliance with the Ubuntu Security Guide. -

- -
    -
  • Ubuntu 22.04 LTS
  • -
  • Ubuntu 20.04 LTS
  • -
  • Ubuntu 18.04 LTS
  • -
  • Ubuntu 16.04 LTS
  • -
- -
- Get CIS tooling with Ubuntu Pro - Learn more about Ubuntu Security Guide +
+
+
+
+
+

How does Charmed Kubernetes comply with CIS benchmarks?

+
+
+

+ Charmed Kubernetes brings not only extensibility and fully automated operations but is designed to comply with the Kubernetes CIS benchmark by default. It further includes tooling to track cluster compliance. +

+
+ +
+
+
+ {{ image(url="https://assets.ubuntu.com/v1/6585c1e7-logo-kubernetes.png", + alt="", + width="900", + height="507", + hi_def=True, + loading="lazy", + attrs={"class": "p-image-container__image"}) | safe + }} +
-
-
-
-

How does Charmed Kubernetes comply with CIS benchmarks?

-

- Charmed Kubernetes brings not only extensibility and fully automated operations but is designed to comply with the Kubernetes CIS benchmark by default. It further includes tooling to track cluster compliance. -

+
+
+
+
+

What is CIS?

+
+

- Read more about Kubernetes and CIS + The Center for Internet Security (CIS) is a non-profit organisation with a mission to “make the connected world a safer place by developing, validating, and promoting timely best practice solutions against pervasive cyber threats”. CIS uses a consensus process to release benchmarks to safeguard organisations against cyber attacks. The consensus review process consists of subject matter experts who provide perspective on different backgrounds like audit and compliance, security research, consulting and software development. The benchmarks are considered a necessary complement in the implementation of a cybersecurity framework, and are the most widely accepted Industry benchmarks to harden a system today. Canonical actively participates in the drafting benchmarks of Ubuntu LTS releases.

-
- {{ image ( - url="https://assets.ubuntu.com/v1/990738e2-kubernetes-cloud.svg", - alt="", - width="263", - height="150", - hi_def=True, - loading="lazy" - ) | safe - }} -
-
+
+
+
+
+
+

What are the CIS Controls?

+
+
+

+ CIS controls is a framework of security best practices that harness the collective experience of the CIS subject matter experts from actual attacks and effective defenses. CIS controls are referenced by International and National frameworks such ETSI’s critical security controls, NIST Cybersecurity framework, and others. +

+
+
+
-

What is CIS?

-

- The Center for Internet Security (CIS) is a non-profit organisation with a mission to “make the connected world a safer place by developing, validating, and promoting timely best practice solutions against pervasive cyber threats”. CIS uses a consensus process to release benchmarks to safeguard organisations against cyber attacks. The consensus review process consists of subject matter experts who provide perspective on different backgrounds like audit and compliance, security research, consulting and software development. The benchmarks are considered a necessary complement in the implementation of a cybersecurity framework, and are the most widely accepted Industry benchmarks to harden a system today. Canonical actively participates in the drafting benchmarks of Ubuntu LTS releases. -

+
+ {{ image(url="https://assets.ubuntu.com/v1/b6d62770-What%20are%20the%20CIS%20Controls.png", + alt="", + width="2464", + height="1028", + hi_def=True, + loading="lazy", + attrs={"class": "p-image-container__image"}) | safe + }} +
-
-
-

What are the CIS Controls?

-

- CIS controls is a framework of security best practices that harness the collective experience of the CIS subject matter experts from actual attacks and effective defenses. CIS controls are referenced by International and National frameworks such ETSI’s critical security controls, NIST Cybersecurity framework, and others. -

+
+
+
+
+

How do benchmarks relate with CIS Controls?

+
+
+

+ The benchmarks map to CIS controls and are designed to additionally reduce the system’s attack surface to mitigate the most common attacks. For that reason, they are considered a necessary complement in the implementation of a cybersecurity framework, and are the most widely accepted Industry benchmark to harden a system today. +

+
-
+
+
-

How do benchmarks relate with CIS Controls?

-

- The benchmarks map to CIS controls and are designed to additionally reduce the system’s attack surface to mitigate the most common attacks. For that reason, they are considered a necessary complement in the implementation of a cybersecurity framework, and are the most widely accepted Industry benchmark to harden a system today. -

- Contact us +

+ Contact us › +

From 236757c7178d6b3f913fab0dcb8726688454d4d3 Mon Sep 17 00:00:00 2001 From: MariaPaula Trujillo Date: Tue, 11 Feb 2025 14:13:02 +0100 Subject: [PATCH 25/31] Apply design review --- templates/security/cis.html | 44 +++++++++++++++++++++---------------- 1 file changed, 25 insertions(+), 19 deletions(-) diff --git a/templates/security/cis.html b/templates/security/cis.html index d2f0c184f5e..9abe6932c91 100644 --- a/templates/security/cis.html +++ b/templates/security/cis.html @@ -124,8 +124,10 @@

Audit with Ubuntu Security Guide


@@ -183,8 +185,10 @@


@@ -194,26 +198,28 @@


-

How does Charmed Kubernetes comply with CIS benchmarks?

-
-
-

- Charmed Kubernetes brings not only extensibility and fully automated operations but is designed to comply with the Kubernetes CIS benchmark by default. It further includes tooling to track cluster compliance. -

+
+

How does Charmed Kubernetes comply with CIS benchmarks?

+
+
+

+ Charmed Kubernetes brings not only extensibility and fully automated operations but is designed to comply with the Kubernetes CIS benchmark by default. It further includes tooling to track cluster compliance. +

+
-
- {{ image(url="https://assets.ubuntu.com/v1/6585c1e7-logo-kubernetes.png", - alt="", - width="900", - height="507", - hi_def=True, - loading="lazy", - attrs={"class": "p-image-container__image"}) | safe +
+ {{ image(url="https://assets.ubuntu.com/v1/ec2c2072-kubernetes-logo.png", + alt="", + width="1800", + height="1013", + hi_def=True, + loading="lazy", + attrs={"class": "p-image-container__image"}) | safe }}
From 2a7a565ca4584781fb1af4693546ffb6641d9d42 Mon Sep 17 00:00:00 2001 From: MariaPaula Trujillo Date: Wed, 12 Feb 2025 20:14:01 +0100 Subject: [PATCH 26/31] Apply code review --- templates/security/cis.html | 12 +++++++----- 1 file changed, 7 insertions(+), 5 deletions(-) diff --git a/templates/security/cis.html b/templates/security/cis.html index 9abe6932c91..6173c9674ff 100644 --- a/templates/security/cis.html +++ b/templates/security/cis.html @@ -83,7 +83,7 @@

Harden your Linux workloads

width="852", height="1278", hi_def=True, - loading="|lazy", + loading="lazy", attrs={"class": "p-image-container__image"}) | safe }}
@@ -139,9 +139,11 @@

Audit with Ubuntu Security Guide

Configure and apply CIS hardening rules in minutes

-

- The compliance tooling has two objectives: it lets our customers harden their Ubuntu systems effortlessly and then quickly audit those systems against the published CIS Ubuntu benchmarks. -

+
+

+ The compliance tooling has two objectives: it lets our customers harden their Ubuntu systems effortlessly and then quickly audit those systems against the published CIS Ubuntu benchmarks. +

+
@@ -165,7 +167,7 @@

Configure and apply CIS hardening rules in minutes

Which versions -
+
of Ubuntu have CIS tooling?

From ed6c378e49f931ba1bfa215703116db2d01692cc Mon Sep 17 00:00:00 2001 From: Britney Wang Date: Tue, 11 Feb 2025 15:33:07 +0800 Subject: [PATCH 27/31] Add cta block class --- templates/security/docker-images.html | 15 ++++++--------- 1 file changed, 6 insertions(+), 9 deletions(-) diff --git a/templates/security/docker-images.html b/templates/security/docker-images.html index 38703e38462..23138c57152 100644 --- a/templates/security/docker-images.html +++ b/templates/security/docker-images.html @@ -184,10 +184,9 @@

Is the LTS Docker Image Portfolio
-

+

{%- endif -%} {%- if slot == 'list_item_title_4' -%} @@ -197,10 +196,9 @@

Is there a long-term commitment? How long?

ESM Images are security-maintained for the full ten year period of their underlying Ubuntu LTS release. Some applications will have versions on multiple Ubuntu LTS versions. In each case, the image is maintained for the full life of the underlying Ubuntu LTS.

-
-

+

{%- endif -%} {%- if slot == 'list_item_title_5' -%} @@ -210,10 +208,9 @@

Can I use these images
-

+

{%- endif -%} {%- if slot == 'list_item_title_6' -%} From 5499df7daa74cbddfe722a533104bf6e271b0799 Mon Sep 17 00:00:00 2001 From: Britney Wang Date: Tue, 11 Feb 2025 16:27:07 +0800 Subject: [PATCH 28/31] Rebrand /security/oval --- templates/security/oval.html | 457 ++++++++++++++++------------------- 1 file changed, 209 insertions(+), 248 deletions(-) diff --git a/templates/security/oval.html b/templates/security/oval.html index 63853e7eb61..2709b3afdac 100644 --- a/templates/security/oval.html +++ b/templates/security/oval.html @@ -1,265 +1,226 @@ {% extends "security/base_security.html" %} +{% from "_macros/vf_hero.jinja" import vf_hero %} + {% block title %}Ubuntu Oval | Security{% endblock %} -{% block meta_description %}Parameters and methods for consuming Ubuntu OVAL data. OVAL is used by the Ubuntu Security Team for CVE tracking and management.{% endblock %} +{% block meta_description %} + Parameters and methods for consuming Ubuntu OVAL data. OVAL is used by the Ubuntu Security Team for CVE tracking and management. +{% endblock %} -{% block meta_copydoc %}https://docs.google.com/document/d/1hBG6NIfBIrixIV753fsOiEymmeuFIF-KOhiDkV68PRY/edit{% endblock meta_copydoc %} +{% block meta_copydoc %} + https://docs.google.com/document/d/1hBG6NIfBIrixIV753fsOiEymmeuFIF-KOhiDkV68PRY/edit +{% endblock meta_copydoc %} {% block content %} -
-
-
-

- Ubuntu OVAL data -

+ + {% call(slot) vf_hero( + title_text='Ubuntu OVAL data', + layout='25/75' + ) -%} + {%- if slot == 'description' -%}

Canonical's Security Team produces Ubuntu OVAL, a structured, machine-readable dataset for all supported Ubuntu releases. It can be used to evaluate and manage security risks related to any existing Ubuntu components. It is based on the Open Vulnerability and Assessment Language (OVAL).

-
-
- {{ - image( - url="https://assets.ubuntu.com/v1/eb653b8e-oval_logo.png", - alt="", - width="250", - height="164", - hi_def=True, - loading="auto", - ) | safe + {%- endif -%} + {%- if slot =='signpost_image' -%} + {{ image(url="https://assets.ubuntu.com/v1/aeb508c5-oval-logo.png", + alt="", + width="852", + height="333", + hi_def=True, + loading="auto") | safe }} + {%- endif -%} + {%- if slot == 'image' -%} +
+ {{ image(url="https://assets.ubuntu.com/v1/7761320f-hero.png", + alt="", + width="2464", + height="1027", + hi_def=True, + loading="auto", + attrs={"class": "p-image-container__image"}) | safe + }} +
+ {% endif -%} + {% endcall -%} + +
+
+
+
+

How we use Ubuntu OVAL

+
+
+

+ Ubuntu OVAL uses the OVAL vulnerability and patch definitions to enable auditing for Common Vulnerabilities and Exposures (CVEs) and to determine whether a particular patch, via an Ubuntu Security Notice (USN), is appropriate for the local system. +

+

+ Ubuntu OVAL also allows for any third-party Security Content Automation Protocol (SCAP) compliant tools to accurately scan an Ubuntu system or an official Ubuntu cloud image for vulnerabilities. +

+ +
-
-
+

-
-
-
-

- How we use Ubuntu OVAL -

-

- Ubuntu OVAL uses the OVAL vulnerability and patch definitions to enable auditing for Common Vulnerabilities and Exposures (CVEs) and to determine whether a particular patch, via an Ubuntu Security Notice (USN), is appropriate for the local system. -

-

- Ubuntu OVAL also allows for any third-party Security Content Automation Protocol (SCAP) compliant tools to accurately scan an Ubuntu system or an official Ubuntu cloud image for vulnerabilities. -

- See the Ubuntu Security Notices +
+
+
+
+

Using Ubuntu's OVAL data

+
-
- {{ - image( - url="https://assets.ubuntu.com/v1/f880a3bd-Enterprise+support.svg", - alt="", - width="200", - height="200", - hi_def=True, - loading="lazy", - ) | safe - }} +
+
+
+
-
-
- -
-
-

- Using Ubuntu's OVAL data -

-
-
-
-
    -
  1. -

    - Using OpenSCAP -

    -
    -

    - Download the compressed XML: -

    +
      +
    1. +
      +
      +

      Using OpenSCAP

      +
      +
      +

      Download the compressed XML:

      wget https://security-metadata.canonical.com/oval/com.ubuntu.$(lsb_release -cs).usn.oval.xml.bz2
      -

      - Uncompress the data: -

      +
      +

      Uncompress the data:

      bunzip2 com.ubuntu.$(lsb_release -cs).usn.oval.xml.bz2
      -

      - Use OpenSCAP to evaluate the OVAL and generate an html report: -

      +
      +

      Use OpenSCAP to evaluate the OVAL and generate an html report:

      oscap oval eval --report report.html com.ubuntu.$(lsb_release -cs).usn.oval.xml
      +

      - The output is generated in the file report.html, open it using your browser: + The output is generated in the file report.html, open it using your browser:

      xdg-open report.html
      -

      - File naming convention: -

      +
      +

      File naming convention:

      com.ubuntu.<example release name>.usn.oval.xml.bz2
      -
      -
    2. -
    3. -

      - Scanning an Official Cloud Image -

      -
      -

      - To scan an Ubuntu Official Cloud Image for known vulnerabilities, the manifest file and xml data can be used together. Unlike above where we were able to use the lsb_release command, you will need to manually enter the URL for the OVAL data. -

      -

      - Note: In the example below we are using focal/20.04, you would replace 'focal' with the version you are inspecting. -

      -
      wget https://security-metadata.canonical.com/oval/oci.com.ubuntu.focal.usn.oval.xml.bz2
      -bunzip2 oci.com.ubuntu.focal.usn.oval.xml.bz2
      -

      - Download the manifest file for the image -

      -
      wget -O manifest https://cloud-images.ubuntu.com/releases/focal/release/ubuntu-20.04-server-cloudimg-amd64-root.manifest
      -

      - Use OpenSCAP to evaluate the OVAL and generate an html report -

      -
      oscap oval eval --report report.html oci.com.ubuntu.focal.usn.oval.xml
      -

      - The output is generated in the file report.html, open it using your browser -

      -
      xdg-open report.html
      -

      - File naming convention: -

      -
      oci.com.ubuntu.<example release name>.usn.oval.xml.bz2
      -
      -
    4. -
    +
-
- {{ - image( - url="https://assets.ubuntu.com/v1/2670bd16-OpenScap-logo.svg", - alt="", - width="210", - height="46", - hi_def=True, - loading="lazy", - ) | safe - }} + +
  • +
    +
    +
    +
    -
  • -
    - -
    -
    -
    -

    - Ubuntu OVAL data parameters -

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    - Parameter - - Description -
    - CVE_ID - - CVE number as reported by MITRE -
    - USN - - Corresponding Ubuntu Security Notice -
    - Description - - A short description of the security risk addressed -
    - Severity - - CVE or USN severity as defined by the Ubuntu Security team -
    - Affected Platform - - Affected Ubuntu release(s), incl ESM -
    - Title - - CVE number, affected Ubuntu release(s), and Severity -
    - Public date - - The date on which a CVE was publicly announced -
    - Public date of USN - - The date on which a USN was published -
    - Reference - - Links to more information about the issue -
    - BugReport - - Link to bugreport about the issue -
    -

    - - Note: The above parameters are included in the OVAL xml file, but not all are shown in the resulting generated OpenSCAP report. - -

    +
    +
    +

    Scanning an Official Cloud Image

    +
    +
    +

    + To scan an Ubuntu Official Cloud Image for known vulnerabilities, the manifest file and xml data can be used together. Unlike above where we were able to use the lsb_release command, you will need to manually enter the URL for the OVAL data. +

    +

    In the example below we are using focal/20.04, you would replace 'focal' with the version you are inspecting.

    +
    wget https://security-metadata.canonical.com/oval/oci.com.ubuntu.focal.usn.oval.xml.bz2
    bunzip2 oci.com.ubuntu.focal.usn.oval.xml.bz2
    +
    +

    Download the manifest file for the image

    +
    wget -O manifest https://cloud-images.ubuntu.com/releases/focal/release/ubuntu-20.04-server-cloudimg-amd64-root.manifest
    +
    +

    Use OpenSCAP to evaluate the OVAL and generate an html report

    +
    oscap oval eval --report report.html oci.com.ubuntu.focal.usn.oval.xml
    +
    +

    + The output is generated in the file report.html, open it using your browser +

    +
    xdg-open report.html
    +
    +

    File naming convention:

    +
    oci.com.ubuntu.<example release name>.usn.oval.xml.bz2
    +
    + + +
    + +
    +
    +
    +
    +

    Ubuntu OVAL data parameters

    +
    +
    +
    +
    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    ParameterDescription
    CVE_IDCVE number as reported by MITRE
    USNCorresponding Ubuntu Security Notice
    DescriptionA short description of the security risk addressed
    SeverityCVE or USN severity as defined by the Ubuntu Security team
    Affected PlatformAffected Ubuntu release(s), incl ESM
    TitleCVE number, affected Ubuntu release(s), and Severity
    Public dateThe date on which a CVE was publicly announced
    Public date of USNThe date on which a USN was published
    ReferenceLinks to more information about the issue
    BugReportLink to bugreport about the issue
    + + Note: The above parameters are included in the OVAL xml file, but not all are shown in the resulting generated OpenSCAP report. + +
    -
    +
    +
    -
    -
    -
    -

    - How Ubuntu OVAL data works -

    +
    +
    +
    +
    +
    +

    How Ubuntu OVAL data works

    +
    +

    As software vulnerabilities are discovered, they are assigned CVE identifiers by MITRE and other organizations. Canonical triages these CVEs to determine whether the vulnerabilities affect software distributed within Ubuntu. The results of this triage are then used to generate the CVE OVAL. The CVE OVAL can be used to assess the local system for vulnerabilities.

    @@ -268,19 +229,19 @@

    -
    - {{ - image( - url="https://assets.ubuntu.com/v1/ce2c3422-how-OVAL-data-works-diagram.svg", - alt="", - width="682", - height="290", - hi_def=True, - loading="lazy", - - ) | safe +
    +
    +
    + {{ image(url="https://assets.ubuntu.com/v1/7761320f-hero.png", + alt="", + width="2464", + height="1027", + hi_def=True, + loading="lazy", + attrs={"class": "p-image-container__image"}) | safe }}
    -
    +
    +
    - {% endblock content %} +{% endblock content %} From 9218f0cb03d452f2b6fac9021bd64ed686347917 Mon Sep 17 00:00:00 2001 From: Britney Wang Date: Tue, 11 Feb 2025 17:01:13 +0800 Subject: [PATCH 29/31] Hide signpost image on small and medium screens --- templates/security/oval.html | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/templates/security/oval.html b/templates/security/oval.html index 2709b3afdac..1efa937b896 100644 --- a/templates/security/oval.html +++ b/templates/security/oval.html @@ -29,7 +29,8 @@ width="852", height="333", hi_def=True, - loading="auto") | safe + loading="auto", + attrs={"class": "u-hide--small u-hide--medium"}) | safe }} {%- endif -%} {%- if slot == 'image' -%} From 424399623b4bc755657256bc6efd71af427808cd Mon Sep 17 00:00:00 2001 From: Britney Wang Date: Wed, 12 Feb 2025 12:56:08 +0800 Subject: [PATCH 30/31] Address design comments --- templates/security/oval.html | 42 +++++++++++++++++------------------- 1 file changed, 20 insertions(+), 22 deletions(-) diff --git a/templates/security/oval.html b/templates/security/oval.html index 1efa937b896..9ad73665d70 100644 --- a/templates/security/oval.html +++ b/templates/security/oval.html @@ -24,13 +24,13 @@

    {%- endif -%} {%- if slot =='signpost_image' -%} - {{ image(url="https://assets.ubuntu.com/v1/aeb508c5-oval-logo.png", - alt="", - width="852", - height="333", - hi_def=True, - loading="auto", - attrs={"class": "u-hide--small u-hide--medium"}) | safe + {{ image(url="https://assets.ubuntu.com/v1/97cb005e-oval-logo.png", + alt="", + width="858", + height="333", + hi_def=True, + loading="auto", + attrs={"class": "u-hide--small u-hide--medium"}) | safe }} {%- endif -%} {%- if slot == 'image' -%} @@ -60,10 +60,8 @@

    How we use Ubuntu OVAL

    Ubuntu OVAL also allows for any third-party Security Content Automation Protocol (SCAP) compliant tools to accurately scan an Ubuntu system or an official Ubuntu cloud image for vulnerabilities.

    -
    @@ -115,7 +113,7 @@

    Using OpenSCAP

    -

    Scanning an Official Cloud Image

    +

    Scanning an
    Official Cloud Image

    @@ -201,8 +199,8 @@

    Ubuntu OVAL data parameters

    Link to bugreport about the issue - - + + Note: The above parameters are included in the OVAL xml file, but not all are shown in the resulting generated OpenSCAP report. @@ -232,14 +230,14 @@

    How Ubuntu OVAL data works

    -
    - {{ image(url="https://assets.ubuntu.com/v1/7761320f-hero.png", - alt="", - width="2464", - height="1027", - hi_def=True, - loading="lazy", - attrs={"class": "p-image-container__image"}) | safe +
    + {{ image(url="https://assets.ubuntu.com/v1/4745474d-how-ubuntu-oval.png", + alt="", + width="3696", + height="1541", + hi_def=True, + loading="lazy", + attrs={"class": "p-image-container__image"}) | safe }}
    From 01eeb4dcf6a8338f818d2af5a6a36cae67f5e505 Mon Sep 17 00:00:00 2001 From: Britney Wang Date: Thu, 13 Feb 2025 13:02:35 +0800 Subject: [PATCH 31/31] Apply code review --- templates/security/oval.html | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/templates/security/oval.html b/templates/security/oval.html index 9ad73665d70..9ff8bdcb96d 100644 --- a/templates/security/oval.html +++ b/templates/security/oval.html @@ -25,7 +25,7 @@ {%- endif -%} {%- if slot =='signpost_image' -%} {{ image(url="https://assets.ubuntu.com/v1/97cb005e-oval-logo.png", - alt="", + alt="Oval logo", width="858", height="333", hi_def=True,