1.1.15 Ensure nodev option set on /dev/shm partition

Information

The nodev mount option specifies that the filesystem cannot contain special devices. Since the /dev/shm filesystem is not intended to support devices, set this option to ensure that users cannot attempt to create special devices in /dev/shm partitions.

Solution

Edit the /etc/fstab file and add nodev to the fourth field (mounting options) for the /dev/shm partition. See the fstab(5) manual page for more information. Run the following command to remount /dev/shm : # mount -o remount,nodev /dev/shm Notes - /dev/shm is not specified in /etc/fstab despite being mounted by default. The following line will implement the recommended /dev/shm mount options in /etc/fstab: tmpfs /dev/shm tmpfs defaults,nodev,nosuid,noexec 0 0

See Also

https://workbench.cisecurity.org/files/2171

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-6(1), CSCv7|5.1

Plugin: Unix

Control ID: c5abf83e451bebdbdf7a076a9a644cebb2c9689f7a17b7e1ebe0c9f6f5334acd