Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-22368 | GEN002430 | SV-38747r1_rule | ECSC-1 | Medium |
Description |
---|
The nodev (or equivalent) mount option causes the system to not handle device files as system devices. This option must be used for mounting any file system not containing approved device files. Device files can provide direct access to system hardware and can compromise security if not protected. |
STIG | Date |
---|---|
Draft AIX Security Technical Implementation Guide | 2011-08-17 |
Check Text ( C-37187r1_chk ) |
---|
If the system does not support a nodev option, this is not applicable. Check /etc/filesystems and verify the nodev mount option (options = ) is used on any file systems mounted from removable media or network shares, or file systems not containing any approved device files. If any such file system is not using the nodev option, this is a finding. |
Fix Text (F-32463r1_fix) |
---|
Edit /etc/filesystems and add the options = nodev to all entries for remote or removable media file systems, and file systems containing no approved device files. |