RHEL-07-020110 - The Red Hat Enterprise Linux operating system must disable the file system automounter unless required.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Automatically mounting file systems permits easy introduction of unknown devices, thereby facilitating malicious activity.

Satisfies: SRG-OS-000114-GPOS-00059, SRG-OS-000378-GPOS-00163, SRG-OS-000480-GPOS-00227

Solution

Configure the operating system to disable the ability to automount devices.

Turn off the automount service with the following commands:

# systemctl stop autofs
# systemctl disable autofs

If 'autofs' is required for Network File System (NFS), it must be documented with the ISSO.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_RHEL_7_V3R7_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000366, CCI|CCI-000778, CCI|CCI-001958, CSCv6|9.1, Rule-ID|SV-204451r603261_rule, STIG-ID|RHEL-07-020110, STIG-Legacy|SV-86609, STIG-Legacy|V-71985, Vuln-ID|V-204451

Plugin: Unix

Control ID: 729704e1397421b39a660e49b8a95860c3408d1ad0c344fe9a176f10c20686ff