Puppet Class: cis_security_hardening::rules::var_nodev
- Defined in:
- manifests/rules/var_nodev.pp
Summary
Ensure nodev option set on /var partitionOverview
The nodev mount option specifies that the filesystem cannot contain special devices.
Rationale: Since the /var filesystem is not intended to support devices, set this option to ensure that users cannot create a block or character special devices in /var.
19 20 21 22 23 24 25 26 27 28 |
# File 'manifests/rules/var_nodev.pp', line 19
class cis_security_hardening::rules::var_nodev (
Boolean $enforce = false,
) {
if ($enforce) and cis_security_hardening::hash_key($facts['mountpoints'], '/var') {
cis_security_hardening::set_mount_options { '/var-nodev':
mountpoint => '/var',
mountoptions => 'nodev',
}
}
}
|