|
237 | 237 | end |
238 | 238 | end |
239 | 239 |
|
240 | | -# There is a mistake in the official CIS DIL documentaion 1.1.10-1.1.14 are |
241 | | -# duplicates of 1.1.9. So I used "skipped" to keep the order of the numbering. |
242 | | -control 'cis-dil-benchmark-1.1.10' do |
243 | | - title 'Ensure noexec option set on /var/tmp partition' |
244 | | - desc "The noexec mount option specifies that the filesystem cannot contain executable binaries.\n\nRationale: Since the /var/tmp filesystem is only intended for temporary file storage, set this option to ensure that users cannot run executable binaries from /var/tmp." |
245 | | - impact 1.0 |
246 | | - |
247 | | - tag cis: 'distribution-independent-linux:1.1.10' |
248 | | - tag level: 1 |
249 | | - |
250 | | - describe 'cis-dil-benchmark-1.1.10' do |
251 | | - skip 'Duplicate of cis-dil-benchmark-1.1.9' |
252 | | - end |
253 | | -end |
254 | | - |
255 | | -control 'cis-dil-benchmark-1.1.11' do |
256 | | - title 'Ensure noexec option set on /var/tmp partition' |
257 | | - desc "The noexec mount option specifies that the filesystem cannot contain executable binaries.\n\nRationale: Since the /var/tmp filesystem is only intended for temporary file storage, set this option to ensure that users cannot run executable binaries from /var/tmp." |
258 | | - impact 1.0 |
259 | | - |
260 | | - tag cis: 'distribution-independent-linux:1.1.11' |
261 | | - tag level: 1 |
262 | | - |
263 | | - |
264 | | - describe 'cis-dil-benchmark-1.1.11' do |
265 | | - skip 'Duplicate of cis-dil-benchmark-1.1.9' |
266 | | - end |
267 | | -end |
268 | | - |
269 | | -control 'cis-dil-benchmark-1.1.12' do |
270 | | - title 'Ensure noexec option set on /var/tmp partition' |
271 | | - desc "The noexec mount option specifies that the filesystem cannot contain executable binaries.\n\nRationale: Since the /var/tmp filesystem is only intended for temporary file storage, set this option to ensure that users cannot run executable binaries from /var/tmp." |
272 | | - impact 1.0 |
273 | | - |
274 | | - tag cis: 'distribution-independent-linux:1.1.12' |
275 | | - tag level: 1 |
276 | | - |
277 | | - describe 'cis-dil-benchmark-1.1.12' do |
278 | | - skip 'Duplicate of cis-dil-benchmark-1.1.9' |
279 | | - end |
280 | | -end |
281 | | - |
282 | | -control 'cis-dil-benchmark-1.1.13' do |
283 | | - title 'Ensure noexec option set on /var/tmp partition' |
284 | | - desc "The noexec mount option specifies that the filesystem cannot contain executable binaries.\n\nRationale: Since the /var/tmp filesystem is only intended for temporary file storage, set this option to ensure that users cannot run executable binaries from /var/tmp." |
285 | | - impact 1.0 |
286 | | - |
287 | | - tag cis: 'distribution-independent-linux:1.1.13' |
288 | | - tag level: 1 |
289 | | - |
290 | | - describe 'cis-dil-benchmark-1.1.13' do |
291 | | - skip 'Duplicate of cis-dil-benchmark-1.1.9' |
292 | | - end |
293 | | -end |
294 | | - |
295 | | -control 'cis-dil-benchmark-1.1.14' do |
296 | | - title 'Ensure noexec option set on /var/tmp partition' |
297 | | - desc "The noexec mount option specifies that the filesystem cannot contain executable binaries.\n\nRationale: Since the /var/tmp filesystem is only intended for temporary file storage, set this option to ensure that users cannot run executable binaries from /var/tmp." |
298 | | - impact 1.0 |
299 | | - |
300 | | - tag cis: 'distribution-independent-linux:1.1.14' |
301 | | - tag level: 1 |
302 | | - |
303 | | - describe 'cis-dil-benchmark-1.1.14' do |
304 | | - skip 'Duplicate of cis-dil-benchmark-1.1.9' |
305 | | - end |
306 | | -end |
307 | | - |
308 | 240 | if cis_level == '2' |
309 | 241 | control 'cis-dil-benchmark-1.1.15' do |
310 | 242 | title 'Ensure separate partition exists for /var/log' |
|
0 commit comments