Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-261286 | SLEM-05-231050 | SV-261286r996338_rule | Medium |
Description |
---|
Automatically mounting file systems permits easy introduction of unknown devices, thereby facilitating malicious activity. |
STIG | Date |
---|---|
SUSE Linux Enterprise Micro (SLEM) 5 Security Technical Implementation Guide | 2024-06-04 |
Check Text ( C-65015r996336_chk ) |
---|
Verify SLEM 5 disables the ability to automount devices. Verify the automounter service is installed with the following command: > sudo zypper se autofs If it is installed, verify the automounter service is active with the following command: > systemctl status autofs autofs.service - Automounts filesystems on demand Loaded: loaded (/usr/lib/systemd/system/autofs.service; disabled) Active: inactive (dead) If the "autofs" status is set to "active" and is not documented with the information system security officer (ISSO) as an operational requirement, this is a finding. |
Fix Text (F-64923r996337_fix) |
---|
Configure SLEM 5 to disable the ability to automount devices. Turn off the automount service with the following command: > sudo systemctl stop autofs > sudo systemctl disable autofs If "autofs" is required for Network File System (NFS), it must be documented with the ISSO. |