Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-22368 | GEN002430 | SV-26015r1_rule | ECSC-1 | Medium |
Description |
---|
The "nodev" (or equivalent) mount option causes the system to not handle device files as system devices. This option must be used for mounting any file system that does not contain approved device files. Device files can provide direct access to system hardware and can compromise security if not protected. |
STIG | Date |
---|---|
UNIX SRG | 2013-03-26 |
Check Text ( C-29199r1_chk ) |
---|
If the system does not support a "nodev" option, this is not applicable. Check /etc/fstab (or equivalent) and verify the "nodev" mount option (or equivalent) is used on any file systems mounted from removable media or network shares, or file systems that do not contain any approved device files. If any such file system is not using the "nodev" option, this is a finding. |
Fix Text (F-26221r1_fix) |
---|
Edit /etc/fstab (or equivalent) and add the "nodev" mount option (or equivalent) to all entries for remote or removable media file systems, and file systems that contain no approved device files. |