Dmitry Teselkin | af730f9 | 2018-08-16 11:29:55 +0300 | [diff] [blame] | 1 | # 1.5.3 Ensure address space layout randomization (ASLR) is enabled |
| 2 | # |
| 3 | # Description |
| 4 | # =========== |
| 5 | # |
| 6 | # Address space layout randomization (ASLR) is an exploit mitigation technique which |
| 7 | # randomly arranges the address space of key data areas of a process. |
| 8 | # |
| 9 | # Rationale |
| 10 | # ========= |
| 11 | # |
| 12 | # Randomly placing virtual memory regions will make it difficult to write memory page |
| 13 | # exploits as the memory placement will be consistently shifting. |
| 14 | # |
| 15 | # Audit |
| 16 | # ===== |
| 17 | # |
| 18 | # Run the following command and verify output matches: |
| 19 | # |
| 20 | # # sysctl kernel.randomize_va_space |
| 21 | # kernel.randomize_va_space = 2 |
| 22 | # |
| 23 | # Remediation |
| 24 | # =========== |
| 25 | # |
| 26 | # Set the following parameter in the /etc/sysctl.conf file: |
| 27 | # |
| 28 | # kernel.randomize_va_space = 2 |
| 29 | # |
| 30 | # Run the following command to set the active kernel parameter: |
| 31 | # |
| 32 | # # sysctl -w kernel.randomize_va_space=2 |
| 33 | |
| 34 | parameters: |
| 35 | linux: |
| 36 | system: |
| 37 | kernel: |
| 38 | sysctl: |
| 39 | kernel.randomize_va_space: 2 |
| 40 | |