badge icon

This article was automatically translated from the original Turkish version.

Article
Developer
Canonical Ltd. and the Open Source Community
Base
Debian GNU/Linux (Unstable branch)
Initial Release
October 2004 (Warty Warthog)
Name Origin
From Nguni Philosophy ("I am because we are")
Supported Architectures
x86-64 (AMD64)ARM64ppc64les390x
Installation Method
Live Image (Canlı Görüntü) / ISO
Package Format
.deb (Debian package) and Snap

Ubuntu is a comprehensive operating system distribution built primarily on the Debian GNU/Linux architecture and composed largely of free and open-source software (FOSS) components. The development process of the distribution is jointly managed by Canonical Ltd., headquartered in the United Kingdom, and a global community of developers. Canonical Ltd., founded by Mark Shuttleworth to ensure the project’s financial sustainability and to employ its development team, serves as the primary sponsor of the project. The name “Ubuntu” is derived from the Nguni philosophy of South African origin and represents ethical and humanistic values such as “humanity toward others” or “a person’s existence gains meaning through community” (I am because we are). The first release of the operating system, “Warty Warthog,” was introduced to the technology world in October 2004.


Ubuntu (Flickr)

Version Management and Enterprise Support Strategies

Release Schedule and Long Term Support (LTS) Policy

Ubuntu adopts a six-month periodic release cycle to enhance predictability in the software world. Within this cycle, stable and continuity-focused Long Term Support (LTS) versions are released every two years. Standard LTS versions receive official support for five years, including compatibility with new hardware architectures, security patches, and updates to the “Ubuntu stack” that forms the cloud computing infrastructure. With the introduction of Ubuntu 12.04 LTS, a strategic change extended the support duration for desktop users to five years, aligning it with the server-side support period.

Extended Security and Compatibility at the Enterprise Level

Canonical offers a subscription service called Ubuntu Pro to meet enterprise needs. This service extends the security updates and patch support provided for LTS versions from five to ten years, and under specific conditions up to twelve years. Ubuntu Pro integrates the Kernel Livepatch technology to maximize system availability, thereby eliminating the traditional conflict between system uptime and security requirements. For enterprise ecosystems, Ubuntu Pro includes integrated security hardening tools that facilitate compliance with internationally recognized regulatory frameworks such as FIPS 140, DISA-STIG, CIS, FedRAMP, CMMC, and PCI-DSS. For managing distributed and large-scale infrastructures, the Landscape management platform is used. Landscape simplifies Information Technology (IT) operations by enabling centralized monitoring, management, and automation of update processes across all Ubuntu systems.


Ubuntu version management (generated by artificial intelligence)

System Architecture and Package Management Ecosystem

Ubuntu’s architectural foundation is built upon Debian, one of the most established distributions in the Linux world. Packages are synchronized into the Ubuntu ecosystem from Debian’s “unstable” branch. However, there is no mandatory binary compatibility between Debian and Ubuntu packages; therefore, some Debian packages require recompilation to function stably within the Ubuntu environment.

Package Format and Distribution Tools

Ubuntu uses the .deb package format along with Debian’s standard tools, dpkg and APT (Advanced Package Tool), for package management. To enhance the end-user experience, graphical interfaces such as GNOME Software (formerly Ubuntu Software Center) are provided. In addition, the Snap packaging technology is actively used in the system to minimize dependency issues and improve cross-distribution portability.

Repository Classification and Licensing Structure

Ubuntu categorizes its software repository into four main groups based on licensing models and levels of support provided:


  1. Main: Contains essential software fully licensed under free and open-source licenses and officially supported by Canonical.
  2. Restricted: Includes software critical for hardware compatibility, such as proprietary graphics card drivers, but with closed or restricted source code. Support level is more limited than that of the Main repository.
  3. Universe: A vast repository of open-source software developed and maintained by the community. Ubuntu Pro subscribers can receive security updates for packages in this repository under Canonical’s guarantee.
  4. Multiverse: Contains software that typically falls into the “non-free” category due to copyright or licensing restrictions, such as multimedia codecs or third-party proprietary applications.


In addition, a mechanism called Personal Package Archives (PPA) allows users to distribute their own compiled packages and serve them as APT repositories.

Architecture Support and Installation Methodology

Ubuntu officially supports various 64-bit architectures to accommodate hardware diversity, including x86-64 (AMD64), ARM64, ppc64le (IBM POWER8 and above), and s390x (IBM Z systems). The installation process is typically carried out using a disk image (.iso). This image can be run as a “Live Session,” allowing users to test hardware compatibility and user experience before permanently installing the operating system on their computer’s hard drive.


System Architecture and Package Management Ecosystem (generated by artificial intelligence)

Security Philosophy and System Hardening

Ubuntu treats security as a multi-layered defense strategy applied across the entire system rather than at a single point.

Privilege Management and Access Control

At the core of Ubuntu’s security architecture is the Principle of Least Privilege. This principle mandates that user processes run by default with minimal permissions, preventing damage to the rest of the system or other users’ data in the event of a security breach. Instead of direct use of the “root” account for administrative tasks, the sudo mechanism is employed to grant temporary privilege escalation. This approach minimizes the risk of unauthorized access and critical system damage caused by human error by keeping the root account locked.


Beyond standard Discretionary Access Control (DAC) mechanisms, Ubuntu employs Mandatory Access Control (MAC) frameworks to enforce stricter process controls. The default MAC system is AppArmor. AppArmor restricts each application’s access to specific files or system calls through predefined profiles. Thus, even if an application is compromised, the attacker’s movement is confined within the boundaries defined by that application’s profile.

Network and Kernel Security

The first step in securing a server (hardening) is service minimization. Unencrypted and insecure protocols such as Telnet or FTP should be disabled and even completely removed from the system, as every unnecessary service expands the attack surface.


To control network traffic, Ubuntu uses the netfilter subsystem within the Linux kernel. Ubuntu provides the Uncomplicated Firewall (UFW) interface to simplify the configuration of iptables rules. The network hardening strategy follows the “default deny” principle: only ports essential for functionality, such as port 22 for SSH and port 443 for HTTPS, are permitted, while all other traffic is blocked. Additionally, local support is provided for full disk encryption and encryption of user directories to ensure data confidentiality.


Security Philosophy and System Hardening (generated by artificial intelligence)

Advanced Enterprise Applications and Network Programmability

Container Architectures and Security Strategies

Canonical offers solutions optimized for containerization, the modern application deployment model. Ubuntu-based images referred to as “chiseled” or “distroless” contain only the minimum libraries required for an application to run. This minimalist approach significantly reduces the attack surface by eliminating unnecessary components.


Canonical provides an aggressive service level agreement (SLA) for container security: high and critical CVE (Common Vulnerabilities and Exposures) findings in its images are guaranteed to be patched within 24 hours. These images are built on the trusted base of the main operating system and are automatically rebuilt upon the release of security patches to maintain their currency.

Software Defined Networks (SDN)

Ubuntu provides an ideal foundation for Software Defined Networking (SDN) architectures, which revolutionize network management by separating the network’s “control plane” (decision-making) from the “data plane” (packet forwarding), thereby making network management hardware-independent and programmable.


SDN controllers manage data plane elements such as Open vSwitch (OVS) through southbound protocols like OpenFlow. OpenFlow enables controllers to dynamically define traffic flow rules. The Ubuntu platform provides the necessary environment for stable operation of these SDN controllers. Academic research and field deployments have confirmed that OpenFlow-based dynamic traffic isolation and programmable network management are significantly faster and more effective than traditional methods, particularly in mitigating large-scale DDoS attacks.

Author Information

Avatar
AuthorArda SongurDecember 18, 2025 at 8:26 PM

Tags

Discussions

No Discussion Added Yet

Start discussion for "Ubuntu" article

View Discussions

Contents

  • Version Management and Enterprise Support Strategies

    • Release Schedule and Long Term Support (LTS) Policy

    • Extended Security and Compatibility at the Enterprise Level

  • System Architecture and Package Management Ecosystem

    • Package Format and Distribution Tools

    • Repository Classification and Licensing Structure

    • Architecture Support and Installation Methodology

  • Security Philosophy and System Hardening

    • Privilege Management and Access Control

    • Network and Kernel Security

  • Advanced Enterprise Applications and Network Programmability

    • Container Architectures and Security Strategies

    • Software Defined Networks (SDN)

Ask to Küre