UCF STIG Viewer Logo

Removable media, remote file systems, and any file system not containing approved device files must be mounted with the nodev option.


Overview

Finding ID Version Rule ID IA Controls Severity
V-22368 GEN002430 SV-29568r1_rule ECSC-1 Medium
Description
The nodev (or equivalent) mount option causes the system to not handle device files as system devices. This option must be used for mounting any file system not containing approved device files. Device files can provide direct access to system hardware and can compromise security if not protected.
STIG Date
HP-UX 11.31 Security Technical Implementation Guide 2018-09-14

Details

Check Text ( C-36398r1_chk )
Each file system line entry must contain a device specific file and may additionally contain all of the following fields, in the following order:
mount directory, type, options, backup frequency, pass number (on parallel fsck) and comment.

Check /etc/fstab and verify that the nodevs mount option is used on all NFS file systems. If an NFS file system is not using the nodevs option, this is a finding.

# cat /etc/fstab | grep -v "^#" | grep nfs
Fix Text (F-31737r1_fix)
Edit /etc/fstab and add the nodevs mount option to all entries for NFS file systems.