Skip to content
ATO Pathways
Log In
Overview
Search
Catalogs
SCAP
OSCAL
Catalogs
Profiles
Documents
References
Knowledge Base
Platform Documentation
Compliance Dictionary
Platform Changelog
About
Catalogs
XCCDF
Guide to the Secure Configuration of OpenEmbedded
System Settings
File Permissions and Masks
Restrict Partition Mount Options
Restrict Partition Mount Options
An XCCDF Group - A logical subset of the XCCDF Benchmark
Details
Profiles
Prose
Restrict Partition Mount Options
2 Rules
System partitions can be mounted with certain options that limit what files on those partitions can do. These options are set in the
/etc/fstab
configuration file, and can be used to make certain types of malicious behavior more difficult.
Value for hidepid option
The hidepid mount option is applicable to /proc and is used to control who can access the information in /proc/[pid] directories. The option can have one of the following values: 0: Everybody may access all /proc/[pid] directories. 1: Users may not access files and subdirectories inside any /proc/[pid] directories but their own. The /proc/[pid] directories themselves remain visible. 2: Same as for mode 1, but in addition the /proc/[pid] directories belonging to other users become invisible.
Removable Partition
This value is used by the checks mount_option_nodev_removable_partitions, mount_option_nodev_removable_partitions, and mount_option_nodev_removable_partitions to ensure that the correct mount options are set on partitions mounted from removable media such as CD-ROMs, USB keys, and floppy drives. This value should be modified to reflect any removable partitions that are required on the local system.
Add nodev Option to /dev/shm
Medium Severity
The
nodev
mount option can be used to prevent creation of device files in
/dev/shm
. Legitimate character and block devices should not exist within temporary directories like
/dev/shm
. Add the
nodev
option to the fourth column of
/etc/fstab
for the line which controls mounting of
/dev/shm
.
Add nosuid Option to /dev/shm
Medium Severity
The
nosuid
mount option can be used to prevent execution of setuid programs in
/dev/shm
. The SUID and SGID permissions should not be required in these world-writable directories. Add the
nosuid
option to the fourth column of
/etc/fstab
for the line which controls mounting of
/dev/shm
.