|
1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859 |
- # CIS 1.5.1 Ensure core dumps are restricted (Scored)
- #
- # Description
- # ===========
- #
- # A core dump is the memory of an executable program. It is generally used to determine
- # why a program aborted. It can also be used to glean confidential information from a core
- # file. The system provides the ability to set a soft limit for core dumps, but this can be
- # overridden by the user.
- #
- # Rationale
- # =========
- #
- # Setting a hard limit on core dumps prevents users from overriding the soft variable. If core
- # dumps are required, consider setting limits for user groups (see limits.conf(5) ). In
- # addition, setting the fs.suid_dumpable variable to 0 will prevent setuid programs from
- # dumping core.
- #
- # Audit
- # =====
- #
- # Run the following commands and verify output matches:
- #
- # # grep "hard core" /etc/security/limits.conf /etc/security/limits.d/*
- # * hard core 0
- # # sysctl fs.suid_dumpable
- # fs.suid_dumpable = 0
- #
- # Remediation
- # ===========
- #
- # Add the following line to the /etc/security/limits.conf file or a
- # /etc/security/limits.d/* file:
- #
- # * hard core 0
- #
- # Set the following parameter in the /etc/sysctl.conf file:
- #
- # fs.suid_dumpable = 0
- #
- # Run the following command to set the active kernel parameter:
- #
- # # sysctl -w fs.suid_dumpable=0
-
- parameters:
- linux:
- system:
- limit:
- cis:
- enabled: true
- domain: '*'
- limits:
- - type: 'hard'
- item: 'core'
- value: 0
- kernel:
- sysctl:
- fs.suid_dumpable: 0
-
|