SLEM 5 must disable the file system automounter unless required.
Severity | Group ID | Group Title | Version | Rule ID | Date | STIG Version |
---|---|---|---|---|---|---|
medium | V-261286 | SRG-OS-000114-GPOS-00059 | SLEM-05-231050 | SV-261286r996338_rule | 2024-06-04 | 1 |
Description |
---|
Automatically mounting file systems permits easy introduction of unknown devices, thereby facilitating malicious activity. |
ℹ️ Check |
---|
Verify SLEM 5 disables the ability to automount devices. Verify the automounter service is installed with the following command: > sudo zypper se autofs If it is installed, verify the automounter service is active with the following command: > systemctl status autofs autofs.service - Automounts filesystems on demand Loaded: loaded (/usr/lib/systemd/system/autofs.service; disabled) Active: inactive (dead) If the "autofs" status is set to "active" and is not documented with the information system security officer (ISSO) as an operational requirement, this is a finding. |
✔️ Fix |
---|
Configure SLEM 5 to disable the ability to automount devices. Turn off the automount service with the following command: > sudo systemctl stop autofs > sudo systemctl disable autofs If "autofs" is required for Network File System (NFS), it must be documented with the ISSO. |