UBTU-16-010590 - File system automounter must be disabled unless required.

Information

Automatically mounting file systems permits easy introduction of unknown devices, thereby facilitating malicious activity.

Satisfies: SRG-OS-000114-GPOS-00059, SRG-OS-000378-GPOS-00163, SRG-OS-000480-GPOS-00227

Solution

Configure the Ubuntu operating system to disable the ability to automount devices.

Turn off the automount service with the following command:

# sudo systemctl stop autofs

If 'autofs' is required for Network File System (NFS), it must be documented with the Information System Security Officer (ISSO).

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_CAN_Ubuntu_16-04_LTS_V2R3_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

References: 800-53|CM-6b., 800-53|IA-3, CAT|II, CCI|CCI-000366, CCI|CCI-000778, CCI|CCI-001958, Rule-ID|SV-214991r610931_rule, STIG-ID|UBTU-16-010590, STIG-Legacy|SV-90213, STIG-Legacy|V-75533, Vuln-ID|V-214991

Plugin: Unix

Control ID: 5b0a787059a9eee1039a41fef2867da000b2ea1c85c27991a893eb47215da97f