UCF STIG Viewer Logo

Removable media, remote file systems, and any file system not containing approved device files must be mounted with the "nodev" option.


Overview

Finding ID Version Rule ID IA Controls Severity
V-22368 GEN002430 SV-37623r1_rule ECSC-1 Medium
Description
The "nodev" (or equivalent) mount option causes the system to not handle device files as system devices. This option must be used for mounting any file system not containing approved device files. Device files can provide direct access to system hardware and can compromise security if not protected.
STIG Date
Red Hat Enterprise Linux 5 Security Technical Implementation Guide 2017-03-01

Details

Check Text ( C-36822r2_chk )
Check /etc/mtab and verify the "nodev" mount option is used on any filesystems mounted from removable media or network shares. If any filesystem mounted from removable media or network shares does not have this option, this is a finding.
Fix Text (F-31660r1_fix)
Edit /etc/fstab and add the "nodev" option to any filesystems mounted from removable media or network shares.