1.5.1 Ensure core dumps are restricted - sysctl

Information

Setting a hard limit on core dumps prevents users from overriding the soft variable. If core dumps are required, consider setting limits for user groups (see limits.conf(5)). In addition, setting the fs.suid_dumpable variable to 0 will prevent setuid programs from dumping core.

Solution

Add the following line to the /etc/security/limits.conf file or a /etc/security/limits.d/* file: * hard core 0 Set the following parameter in the /etc/sysctl.conf file: fs.suid_dumpable = 0 Run the following command to set the active kernel parameter: # sysctl -w fs.suid_dumpable=0

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-6, CSCv6|13

Plugin: Unix

Control ID: 824f19c357633e9d23176a1746b14d01133c67a185f8ca74ac3f56b5d9bf8425