Puppet Class: cis_security_hardening::rules::var_nosuid
- Defined in:
- manifests/rules/var_nosuid.pp
Summary
Ensure nosuid option set on /var partitionOverview
The nosuid mount option specifies that the filesystem cannot contain setuid files.
Rationale: Since the /var filesystem is only intended for variable files such as logs, set this option to ensure that users cannot create setuid files in /var.
19 20 21 22 23 24 25 26 27 28 |
# File 'manifests/rules/var_nosuid.pp', line 19
class cis_security_hardening::rules::var_nosuid (
Boolean $enforce = false,
) {
if ($enforce) and cis_security_hardening::hash_key($facts['mountpoints'], '/var') {
cis_security_hardening::set_mount_options { '/var-nosuid':
mountpoint => '/var',
mountoptions => 'nosuid',
}
}
}
|