Disable Network File Systems (netfs)
An XCCDF Rule
Description
The netfs script manages the boot-time mounting of several types
of networked filesystems, of which NFS and Samba are the most common. If these
filesystem types are not in use, the script can be disabled, protecting the
system somewhat against accidental or malicious changes to /etc/fstab
and against flaws in the netfs script itself.
The netfs
service can be disabled with the following command:
$ sudo systemctl mask --now netfs.service
- ID
- xccdf_org.ssgproject.content_rule_service_netfs_disabled
- Severity
- Unknown
- Updated
Remediation - Kubernetes Patch
apiVersion: machineconfiguration.openshift.io/v1
kind: MachineConfig
spec:
config:
ignition:
version: 3.1.0
Remediation - OS Build Blueprint
[customizations.services]
disabled = ["netfs"]
Remediation - Shell Script
# Remediation is applicable only in certain platforms
if [ ! -f /.dockerenv ] && [ ! -f /run/.containerenv ]; then
SYSTEMCTL_EXEC='/usr/bin/systemctl'
"$SYSTEMCTL_EXEC" stop 'netfs.service'
"$SYSTEMCTL_EXEC" disable 'netfs.service'
Remediation - Ansible
- name: Block Disable service netfs
block:
- name: Disable service netfs
block:
Remediation - Puppet
include disable_netfs
class disable_netfs {
service {'netfs':
enable => false,
ensure => 'stopped',