Essential Eight on Linux, Part 3 of 8: Patch Operating Systems on Ubuntu 26.04 LTS Source

1---
2title: "Essential Eight on Linux, Part 3 of 8: Patch Operating Systems on Ubuntu 26.04 LTS"
3date: "2026-04-28"
4tags: ["essential-eight", "asd", "ism", "ubuntu", "ubuntu-pro", "livepatch", "landscape", "linux", "patching", "security"]
5author: "Gavin Jackson"
6excerpt: "Part 3 of an 8-part series on implementing the Essential Eight on Ubuntu 26.04 LTS, covering operating system patching with Ubuntu Pro, Livepatch, Landscape, and uptime-aware compensating controls."
7---
8
9# Essential Eight on Linux, Part 3 of 8: Patch Operating Systems on Ubuntu 26.04 LTS
10
11This is the mitigation most people assume Linux already does well.
12
13And to be fair, Ubuntu does do it well. But the Essential Eight bar is not "Linux can patch." The bar is closer to "can you patch quickly, consistently, and with evidence across workstations, servers, and internet-facing systems?"
14
15That is where **Ubuntu Pro**, **Livepatch**, and **Landscape** become much more than convenience features.
16
17## What ASD is trying to achieve
18
19The OS patching mitigation is about reducing the lifespan of exploitable platform weaknesses.
20
21For Ubuntu 26.04 LTS, that means:
22
23- security updates for base packages
24- kernel patching and reboot strategy
25- prompt remediation of internet-facing systems
26- handling unsupported versions before they turn into exception debt
27
28## Ubuntu 26.04 LTS reference implementation
29
30### Resolute Raccoon highlights
31
32Ubuntu 26.04 LTS brings a few changes that are directly relevant to this mitigation:
33
34- **Livepatch now extends to Arm64**
35- **TPM-backed full-disk encryption** is generally available in the installer
36- Canonical has expanded the use of **memory-safe system components**, including Rust-based utilities and additional Rust in kernel components
37
38Livepatch for Arm64 is the big one here. It narrows the operational gap between x86_64 and Arm fleets when you are trying to reduce kernel exposure without constant reboot churn.
39
40### 1. Standardise on Ubuntu Pro for enterprise fleets
41
42If Ubuntu 26.04 LTS is your reference build, Ubuntu Pro should be the default security posture, not an optional extra.
43
44Why:
45
46- extended security maintenance for a much broader package set
47- Livepatch access for supported kernels
48- a cleaner operational model for long-lived enterprise servers
49
50For Essential Eight alignment, that broader support window matters because unsupported or weakly maintained packages create risk long before the OS itself reaches end of life.
51
52### 2. Use Livepatch, but do not confuse it with "no more reboots"
53
54Canonical Livepatch is one of the most useful Linux security features in the enterprise toolbox. It can apply critical kernel security fixes without waiting for your next maintenance reboot.
55
56That is excellent for exposure reduction, especially on internet-facing or high-availability systems.
57
58But it is not magic:
59
60- not every kernel update is livepatchable
61- non-kernel package updates still need standard patching
62- you still need planned reboots for full package and kernel lifecycle hygiene
63
64In other words, Livepatch reduces risk between maintenance windows. It does not remove the need for maintenance windows.
65
66> **A note from the real world**
67>
68> When testing Livepatch on Ubuntu 24.04, a few things frustrated me. It felt like a separate update channel rather than something fully native to the normal APT-driven Ubuntu Pro experience, and it was easy to overestimate what it actually does operationally.
69>
70> Livepatch does **not** mean "turn it on and you now get kernel updates forever without reboots." You still need to be on a supported kernel series first, and you still need to upgrade and reboot within the documented support window to stay covered.
71>
72> My other frustration was Landscape integration. Canonical does now document Livepatch visibility in the **Kernel** tab in newer Landscape releases, which is better than I first thought, but I still have not seen a documented "apply Livepatch now" style workflow or the kind of fleet view I would like for tracking systems that are nearing the end of Livepatch coverage.
73>
74> I am hopeful some of this feels more integrated in the Ubuntu 26.04 generation of Ubuntu Pro, Livepatch, and Landscape, because the underlying idea is very good.
75
76### 3. Use Landscape to run patch rings
77
78For Ubuntu fleets, I would separate at least three operating system patch rings:
79
80- workstations and general user endpoints
81- internal servers
82- internet-facing servers
83
84Landscape gives you a way to stage updates, check fleet status, and avoid turning every host into a snowflake. That is particularly useful when the Essential Eight timelines for internet-facing assets are tighter than the rest of the estate.
85
86### 4. Keep firmware and platform lifecycle in view
87
88ASD talks about operating systems, but in practice the reliability of the control also depends on platform health:
89
90- UEFI or BIOS updates
91- storage controller firmware
92- out-of-band management firmware
93- cloud image currency
94
95On Ubuntu, `fwupd` and LVFS can help on supported hardware, but many enterprises will still need vendor tooling and infrastructure processes outside the base OS.
96
97### 5. Reduce the number of special cases
98
99OS patching gets ugly when the estate includes:
100
101- old kernels kept for vendor compatibility
102- third-party kernel modules
103- hand-built images with unclear provenance
104- internet-facing systems treated as one-off pets
105
106If you can eliminate those patterns, the Essential Eight requirement becomes much more realistic.
107
108## ISM control mapping
109
110The October 2024 Essential Eight to ISM mapping ties this mitigation to these controls:
111
112| ISM control | Linux implementation on Ubuntu 26.04 LTS |
113|-------------|-------------------------------------------|
114| `ISM-1807` | Patch or remove vulnerable OS components on workstations in line with required timelines. |
115| `ISM-1808` | Patch or remove vulnerable OS components on internet-facing servers as a priority. |
116| `ISM-1701` | Apply operating system vendor security updates within the required timeframe. |
117| `ISM-1702` | Prioritise internet-facing systems and other exposed workloads for rapid remediation. |
118| `ISM-1877` | Ensure core operating system components are current and supported. |
119| `ISM-1694` | Maintain an accurate inventory of operating system versions and patch levels. |
120| `ISM-1695` | Verify that operating system updates were applied successfully across the fleet. |
121| `ISM-1501` | Replace or upgrade unsupported operating systems before they become unmanaged risk. |
122| `ISM-1696` | Use compensating controls when an operating system cannot be patched immediately. |
123| `ISM-1902` | Limit exposure for vulnerable operating systems through additional protections. |
124| `ISM-1879` | Apply higher-maturity operating system patching disciplines consistently to the environment. |
125| `ISM-1697` | Govern exceptions and technical debt where patching is constrained by application compatibility. |
126| `ISM-1903` | Reduce attack surface for systems awaiting patching through segmentation and access control. |
127| `ISM-1904` | Ensure vulnerable operating systems are isolated, monitored, or replaced when full remediation is delayed. |
128
129## Where Ubuntu is strong
130
131Ubuntu is in a good place for this mitigation because the control stack is coherent:
132
133- a clear package manager
134- long-term support releases
135- official security notices
136- Ubuntu Pro support options
137- Livepatch for kernel exposure reduction
138- Landscape for fleet operations
139
140That is a much better place to be than mixed Linux estates where every distribution has its own lifecycle and tooling expectations.
141
142## Compensating controls when patching cannot happen immediately
143
144Sometimes the blocker is real. Legacy vendor software, kernel module dependencies, or narrow maintenance windows can slow you down.
145
146When that happens, do not just record an exception and move on. Add controls:
147
148- remove direct internet exposure
149- restrict admin paths with Teleport or a hardened bastion
150- apply AppArmor confinement where practical
151- tighten host firewall policy
152- increase logging and alerting
153- accelerate the replacement plan
154
155For high-risk hosts, I would much rather see a tightly brokered and segmented vulnerable system than an unpatched host sitting directly on a management network with broad SSH reachability.
156
157## The bottom line
158
159Ubuntu 26.04 LTS is a solid reference implementation for the Essential Eight operating system patching mitigation, especially when you lean into the Canonical stack.
160
161Use **Ubuntu Pro** for lifecycle coverage, **Livepatch** to reduce kernel exposure, and **Landscape** to make the process real at fleet scale. Resolute Raccoon's Arm64 Livepatch support is especially welcome if your Linux estate has moved beyond x86_64. Linux is not automatically compliant just because it patches well in theory. The win comes from operational discipline.
162
163## References
164
165- [ASD Essential Eight maturity model and ISM mapping (October 2024)](https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/essential-eight/essential-eight-maturity-model-and-ism-mapping)
166- [Ubuntu Pro](https://ubuntu.com/pro)
167- [Canonical Livepatch](https://ubuntu.com/security/livepatch)
168- [How to manage Livepatch](https://documentation.ubuntu.com/pro-client/en/docs/howtoguides/enable_livepatch/)
169- [How kernel livepatching works](https://ubuntu.com/security/livepatch/docs/livepatch/explanation/howitworks)
170- [Kernels covered by Livepatch](https://ubuntu.com/security/livepatch/docs/kernels)
171- [How to check the Livepatch client status](https://ubuntu.com/security/livepatch/docs/livepatch/how-to/status)
172- [Landscape documentation](https://documentation.ubuntu.com/landscape/)
173- [How to manage Livepatch and kernel updates from the Landscape web portal](https://documentation.ubuntu.com/landscape/how-to-guides/web-portal/web-portal-24-04-or-later/manage-livepatch-and-kernel-updates/)
174- [Ubuntu Server security documentation](https://ubuntu.com/server/docs/security-introduction)
175