Skip to content

CIS Hardening Policy to add noexec for /tmp #1049

Open
@daemon1024

Description

@daemon1024

Ref https://www.tenable.com/audits/items/CIS_Fedora_19_Family_Linux_Server_L1_v1.0.0.audit:cb3137da1a61c8c0f01d86957ea67ada
Please find relevant official source for this CIS rule.

We can secure against this using the following KubeArmor rule.

  process:
    matchDirectories:
    - dir: /tmp/
      recursive: true
      action: Block

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions