GEN002430 - Removable media, remote file systems and any file system that do not contain device files must be mounted with 'nodev' option.

Information

The 'nodev' (or equivalent) mount option causes the system to not handle device files as system devices. This option must be used for mounting any file system not containing approved device files. Device files can provide direct access to system hardware and can compromise security if not protected.

Solution

Edit /etc/fstab and add the 'nodev' option to any filesystems mounted from removable media or network shares.

See Also

http://iasecontent.disa.mil/stigs/zip/U_RedHat_5_V1R18_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|II, CCI|CCI-000366, Group-ID|V-22368, Rule-ID|SV-37623r1_rule, STIG-ID|GEN002430, Vuln-ID|V-22368

Plugin: Unix

Control ID: bd9ef0d9b096bfd26d9a7030375c02bef90cff5d3c3691a1905f43627f751021