Enable Kernel Page-Table Isolation (KPTI)
An XCCDF Rule
Description
To enable Kernel page-table isolation,
add the argument pti=on
to the default
GRUB 2 command line for the Linux operating system.
Configure the default Grub2 kernel command line to contain pti=on as follows:
# grub2-editenv - set "$(grub2-editenv - list | grep kernelopts) pti=on"
Rationale
Kernel page-table isolation is a kernel feature that mitigates the Meltdown security vulnerability and hardens the kernel against attempts to bypass kernel address space layout randomization (KASLR).
- ID
- xccdf_org.ssgproject.content_rule_grub2_pti_argument
- Severity
- Low
- Updated
Remediation - OS Build Blueprint
[customizations.kernel]
append = "pti=on"
Remediation - Ansible
- name: Gather the package facts
package_facts:
manager: auto
tags:
- NIST-800-53-SI-16
- grub2_pti_argument
Remediation - Shell Script
# Remediation is applicable only in certain platforms
if rpm --quiet -q grub2-common && { [ ! -f /.dockerenv ] && [ ! -f /run/.containerenv ]; }; then
grubby --update-kernel=ALL --args=pti=on
else