1.1.15 Add nosuid Option to /dev/shm Partition

Information

The nosuid mount option specifies that the /dev/shm (temporary filesystem stored in memory) will not execute setuid and setgid on executable programs as such, but rather execute them with the uid and gid of the user executing the program.

Rationale:

Setting this option on a file system prevents users from introducing privileged programs onto the system and allowing non-root users to execute them.

Solution

Edit the /etc/fstab file and add nosuid to the fourth field (mounting options). Look for entries that have mount points that contain /dev/shm. See the fstab(5) manual page for more information.

# mount -o remount,nosuid /dev/shm

Default Value:

OS Default: N/A

See Also

https://workbench.cisecurity.org/files/3096

Item Details

Category: CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|CM-6, 800-53|SC-7(10), CSCv6|3.1, CSCv7|5.1, CSCv7|13

Plugin: Unix

Control ID: 0a9100abfd8e0d782a522772550d7f142125a949f9ca72c5fb8b03a9c163e16e