|
1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495 |
- # CIS 1.1.14 Ensure nodev option set on /dev/shm partition (Scored)
- #
- # Description
- # ===========
- # The nodev mount option specifies that the filesystem cannot contain special
- # devices.
- #
- # Rationale
- # =========
- # Since the /run/shm filesystem is not intended to support devices, set this
- # option to ensure that users cannot attempt to create special devices in
- # /dev/shm partitions.
- #
- # Audit
- # =====
- # Run the following command and verify that the nodev option is set on /dev/shm .
- #
- # # mount | grep /dev/shm
- # shm on /dev/shm type tmpfs (rw,nosuid,nodev,noexec,relatime)
- #
- # Remediation
- # ===========
- #
- # Edit the /etc/fstab file and add nodev to the fourth field (mounting options)
- # for the /dev/shm partition. See the fstab(5) manual page for more information.
- # Run the following command to remount /dev/shm :
- #
- # # mount -o remount,nodev /dev/shm
- #
- # CIS 1.1.15 Ensure nosuid option set on /dev/shm partition (Scored)
- #
- # Description
- # ===========
- # The nosuid mount option specifies that the filesystem cannot contain setuid
- # files.
- #
- # Rationale
- # =========
- # Setting this option on a file system prevents users from introducing
- # privileged programs onto the system and allowing non-root users to execute them.
- #
- # Audit
- # =====
- # Run the following command and verify that the no suid option is set on /dev/shm .
- #
- # # mount | grep /dev/shm
- # shm on /dev/shm type tmpfs (rw,nosuid,nodev,noexec,relatime)
- #
- # Remediation
- # ===========
- # Edit the /etc/fstab file and add nosuid to the fourth field (mounting options)
- # for the /dev/shm partition. See the fstab(5) manual page for more information.
- # Run the following command to remount /dev/shm :
- #
- # # mount -o remount,nosuid /dev/shm
- #
- # 1.1.16 Ensure noexec option set on /dev/shm partition (Scored)
- #
- # Description
- # ===========
- # The noexec mount option specifies that the filesystem cannot contain
- # executable binaries.
- #
- # Rationale
- # =========
- # Setting this option on a file system prevents users from executing programs
- # from shared memory. This deters users from introducing potentially malicious
- # software on the system.
- #
- # Audit
- # =====
- # Run the following command and verify that the noexec option is set on /run/shm .
- #
- # # mount | grep /dev/shm
- # shm on /dev/shm type tmpfs (rw,nosuid,nodev,noexec,relatime)
- #
- # Remediation
- # ===========
- # Edit the /etc/fstab file and add noexec to the fourth field (mounting options)
- # for the /dev/shm partition. See the fstab(5) manual page for more information.
- # Run the following command to remount /dev/shm :
- #
- # # mount -o remount,noexec /dev/shm
- #
- parameters:
- linux:
- storage:
- mount:
- ensure_dev_shm_mount_options:
- enabled: true
- file_system: tmpfs
- device: shm
- path: /dev/shm
- opts: rw,nosuid,nodev,noexec,relatime
-
|