4.4.3.1 Ensure only / permits device files.

Information

The filesystem mount option nodev ensures that special device files are not recognized as device files. This recommendation audits all rootvg filesystems to ensure that only the root filesystem '/' allows the use of

device

special files.

Solution

- The following command remounts filesystems with 'nodev' added:

mount | grep jfs | /usr/bin/egrep -v "/dev/hd4|nodev" | while read lv fs jfs m d t options
do
mount -o remount,${options},nodev $fs
done
- The following command updates the stanza in /etc/filesystems

lsfs | grep jfs | /usr/bin/egrep -v "/dev/hd4|nodev" | while read lv node fs jfs size options rest
do
if [ ${options} == "--" ]; then
chfs -a options=nodev $fs
else
chfs -a options=${options},nodev $fs
fi
done

See Also

https://workbench.cisecurity.org/benchmarks/10385

Item Details

Category: ACCESS CONTROL, MEDIA PROTECTION

References: 800-53|AC-3, 800-53|AC-5, 800-53|AC-6, 800-53|MP-2, CSCv7|14.6

Plugin: Unix

Control ID: 261f2bedcac591f058058a6ff1c4703d773c2a2d98d6faee0867b263f1321808