Check: SLES-15-010240
SUSE Linux Enterprise Server 15 STIG:
SLES-15-010240
(in version v2 r6)
Title
The SUSE operating system must disable the file system automounter. (Cat II impact)
Discussion
Automatically mounting file systems permits easy introduction of unknown devices, thereby facilitating malicious activity. Satisfies: SRG-OS-000114-GPOS-00059, SRG-OS-000378-GPOS-00163
Check Content
Verify the SUSE operating system disables the ability to automount devices. Check to see if automounter service is active with the following command: > systemctl status autofs autofs.service - Automounts filesystems on demand Loaded: loaded (/usr/lib/systemd/system/autofs.service; disabled) Active: inactive (dead) If the "autofs" status is set to "active" this is a finding.
Fix Text
Configure the SUSE operating system to disable the ability to automount devices. Turn off the automount service with the following commands: > systemctl stop autofs > systemctl disable autofs
Additional Identifiers
Rule ID: SV-234823r1155795_rule
Vulnerability ID: V-234823
Group Title: SRG-OS-000114-GPOS-00059
Expert Comments
CCIs
| Number | Definition |
|---|---|
| CCI-000778 |
Uniquely identify organization-defined devices and/or types of devices before establishing a local, remote, and/or network connection. |
| CCI-001958 |
Authenticate organization-defined devices and/or types of devices before establishing a local, remote, and/or network connection. |
Controls
| Number | Title |
|---|---|
| IA-3 |
Device Identification and Authentication |