blob: 94e914e9c4b214e1c9dfd9c8ff2658b77bed75e5 [file] [log] [blame]
Dmitry Teselkinaf730f92018-08-16 11:29:55 +03001# 1.5.3 Ensure address space layout randomization (ASLR) is enabled
2#
3# Description
4# ===========
5#
6# Address space layout randomization (ASLR) is an exploit mitigation technique which
7# randomly arranges the address space of key data areas of a process.
8#
9# Rationale
10# =========
11#
12# Randomly placing virtual memory regions will make it difficult to write memory page
13# exploits as the memory placement will be consistently shifting.
14#
15# Audit
16# =====
17#
18# Run the following command and verify output matches:
19#
20# # sysctl kernel.randomize_va_space
21# kernel.randomize_va_space = 2
22#
23# Remediation
24# ===========
25#
26# Set the following parameter in the /etc/sysctl.conf file:
27#
28# kernel.randomize_va_space = 2
29#
30# Run the following command to set the active kernel parameter:
31#
32# # sysctl -w kernel.randomize_va_space=2
33
34parameters:
35 linux:
36 system:
37 kernel:
38 sysctl:
39 kernel.randomize_va_space: 2
40