1.1.11 Ensure nosuid option set on /dev/shm partition


The nosuid mount option specifies that the filesystem cannot contain setuid files.


Setting this option on a file system prevents users from introducing privileged programs onto the system and allowing non-root users to execute them.


Run the following command to remount /dev/shm :

# mount -o remount,nosuid /dev/shm

/etc is stateless on Container-Optimized OS. Therefore, /etc cannot be used to make these changes persistent across reboots. The steps mentioned above needs to be performed after every boot.

See Also