Skip to content
ATO Pathways
Log In
Overview
Search
Catalogs
SCAP
OSCAL
Catalogs
Profiles
Resources
Documents
Publishers
References
Knowledge Base
Platform Documentation
Compliance Dictionary
Platform Changelog
About
Catalogs
XCCDF
Guide to the Secure Configuration of Debian 11
System Settings
File Permissions and Masks
Restrict Partition Mount Options
Restrict Partition Mount Options
An XCCDF Group - A logical subset of the XCCDF Benchmark
Details
Profiles
Prose
Restrict Partition Mount Options
2 Rules
System partitions can be mounted with certain options that limit what files on those partitions can do. These options are set in the
/etc/fstab
configuration file, and can be used to make certain types of malicious behavior more difficult.
Add nodev Option to /dev/shm
Medium Severity
The
nodev
mount option can be used to prevent creation of device files in
/dev/shm
. Legitimate character and block devices should not exist within temporary directories like
/dev/shm
. Add the
nodev
option to the fourth column of
/etc/fstab
for the line which controls mounting of
/dev/shm
.
Add nosuid Option to /dev/shm
Medium Severity
The
nosuid
mount option can be used to prevent execution of setuid programs in
/dev/shm
. The SUID and SGID permissions should not be required in these world-writable directories. Add the
nosuid
option to the fourth column of
/etc/fstab
for the line which controls mounting of
/dev/shm
.