Skip to content

Commit 7e759d1

Browse files
committed
Remove CIS policy "Ensure XD/NX support is enabled" for SCA.
This policy increases the memory usage of the agent and needs a fix in the code of SCA.
1 parent 09b8eb1 commit 7e759d1

File tree

8 files changed

+0
-130
lines changed

8 files changed

+0
-130
lines changed

sca/centos/6/cis_centos6_linux.yml

Lines changed: 0 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -598,22 +598,6 @@ checks:
598598
- 'c:sysctl fs.suid_dumpable -> r:^fs.suid_dumpable\s*=\s*0\s*$'
599599
- 'c:grep -Rh fs\.suid_dumpable /etc/sysctl.conf /etc/sysctl.d -> r:^\s*fs.suid_dumpable\s*=\s*0\s*$'
600600

601-
# 1.5.2 XD/NX enabled
602-
- id: 5533
603-
title: "Ensure XD/NX support is enabled"
604-
description: "Recent processors in the x86 family support the ability to prevent code execution on a per memory page basis. Generically and on AMD processors, this ability is called No Execute (NX), while on Intel processors it is called Execute Disable (XD). This ability can help prevent exploitation of buffer overflow vulnerabilities and should be activated whenever possible. Extra steps must be taken to ensure that this protection is enabled, particularly on 32-bit x86 systems. Other processors, such as Itanium and POWER, have included such support since inception and the standard kernel for those platforms supports the feature."
605-
rationale: "Enabling any feature that can protect against buffer overflow attacks enhances the security of the system."
606-
remediation: "On 32 bit systems install a kernel with PAE support, no installation is required on 64 bit systems: If necessary configure your bootloader to load the new kernel and reboot the system. You may need to enable NX or XD support in your bios."
607-
compliance:
608-
- cis: ["1.5.2"]
609-
- cis_csc: ["8.4"]
610-
- pci_dss: ["2.2.4"]
611-
- nist_800_53: ["CM.1"]
612-
- tsc: ["CC5.2"]
613-
condition: all
614-
rules:
615-
- 'c:dmesg -> r:NX \(Execute Disable\) protection: active'
616-
617601
# 1.5.3 Enable Randomized Virtual Memory Region Placement (Scored)
618602
- id: 5534
619603
title: "Ensure address space layout randomization (ASLR) is enabled"

sca/centos/7/cis_centos7_linux.yml

Lines changed: 0 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -641,23 +641,6 @@ checks:
641641
- 'c:sysctl fs.suid_dumpable -> r:^\s*fs.suid_dumpable\s*=\s*0\s*$'
642642
- 'c:grep -Rh fs\.suid_dumpable /etc/sysctl.conf /etc/sysctl.d -> r:^\s*fs.suid_dumpable\s*=\s*0\s*$'
643643

644-
# 1.6.2 XD/NX enabled
645-
- id: 6033
646-
title: "Ensure XD/NX support is enabled"
647-
description: "Recent processors in the x86 family support the ability to prevent code execution on a per memory page basis. Generically and on AMD processors, this ability is called No Execute (NX), while on Intel processors it is called Execute Disable (XD). This ability can help prevent exploitation of buffer overflow vulnerabilities and should be activated whenever possible. Extra steps must be taken to ensure that this protection is enabled, particularly on 32-bit x86 systems. Other processors, such as Itanium and POWER, have included such support since inception and the standard kernel for those platforms supports the feature."
648-
rationale: "Enabling any feature that can protect against buffer overflow attacks enhances the security of the system."
649-
remediation: "On 32 bit systems install a kernel with PAE support, no installation is required on 64 bit systems: If necessary configure your bootloader to load the new kernel and reboot the system. You may need to enable NX or XD support in your bios."
650-
compliance:
651-
- cis: ["1.6.2"]
652-
- cis_csc: ["8.3"]
653-
- pci_dss: ["2.2.4"]
654-
- nist_800_53: ["CM.1"]
655-
- tsc: ["CC5.2"]
656-
condition: any
657-
rules:
658-
- 'c:journalctl -> r:^kernel:\s+NX \(Execute Disable\) protection: active'
659-
- 'c:dmesg -> r:NX \(Execute Disable\) protection: active'
660-
661644
# 1.6.3 Enable Randomized Virtual Memory Region Placement (Scored)
662645
- id: 6034
663646
title: "Ensure address space layout randomization (ASLR) is enabled"

sca/debian/cis_debian10.yml

Lines changed: 0 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -570,21 +570,6 @@ checks:
570570

571571
# 1.6 Additional Process Hardening
572572

573-
- id: 2533
574-
title: "Ensure XD/NX support is enabled"
575-
description: "Recent processors in the x86 family support the ability to prevent code execution on a per memory page basis. Generically and on AMD processors, this ability is called No Execute (NX), while on Intel processors it is called Execute Disable (XD). This ability can help prevent exploitation of buffer overflow vulnerabilities and should be activated whenever possible. Extra steps must be taken to ensure that this protection is enabled, particularly on 32-bit x86 systems. Other processors, such as Itanium and POWER, have included such support since inception and the standard kernel for those platforms supports the feature."
576-
rationale: "Enabling any feature that can protect against buffer overflow attacks enhances the security of the system."
577-
remediation: "On 32 bit systems install a kernel with PAE support, no installation is required on 64 bit systems: If necessary configure your bootloader to load the new kernel and reboot the system. You may need to enable NX or XD support in your bios."
578-
compliance:
579-
- cis: ["1.6.1"]
580-
- cis_csc: ["8.3"]
581-
- pci_dss: ["2.2.4"]
582-
- nist_800_53: ["CM.1"]
583-
- tsc: ["CC5.2"]
584-
condition: all
585-
rules:
586-
- 'c:journalctl -> r:NX \(Execute Disable\) protection: active'
587-
588573
- id: 2534
589574
title: "Ensure address space layout randomization (ASLR) is enabled"
590575
description: "Address space layout randomization (ASLR) is an exploit mitigation technique which randomly arranges the address space of key data areas of a process."

sca/debian/cis_debian7.yml

Lines changed: 0 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -409,21 +409,6 @@ checks:
409409
- 'c:sysctl fs.suid_dumpable -> r:=\s*0$'
410410
- 'c:grep -Rh ^*[[:space:]]*hard[[:space:]][[:space:]]*core[[:space:]][[:space:]]* /etc/security/limits.conf /etc/security/limits.d -> r:\s0$|\t0$'
411411

412-
# 4.2 Enable XD/NX Support on 32-bit x86 Systems (Not Scored)
413-
- id: 1026
414-
title: "Enable XD/NX Support on 32-bit x86 Systems"
415-
description: "Recent processors in the x86 family support the ability to prevent code execution on a per memory page basis. Generically and on AMD processors, this ability is called No Execute (NX), while on Intel processors it is called Execute Disable (XD). This ability can help prevent exploitation of buffer overflow vulnerabilities and should be activated whenever possible. Extra steps must be taken to ensure that this protection is enabled, particularly on 32-bit x86 systems. Other processors, such as Itanium and POWER, have included such support since inception and the standard kernel for those platforms supports the feature."
416-
rationale: "Enabling any feature that can protect against buffer overflow attacks enhances the security of the system."
417-
remediation: "On 32 bit systems install a kernel with PAE support, no installation is required on 64 bit systems: If necessary configure your bootloader to load the new kernel and reboot the system. You may need to enable NX or XD support in your bios."
418-
compliance:
419-
- cis: ["4.2"]
420-
- pci_dss: ["2.2.4"]
421-
- nist_800_53: ["CM.1"]
422-
- tsc: ["CC5.2"]
423-
condition: all
424-
rules:
425-
- 'c:dmesg -> r:NX \(Execute Disable\) protection: active'
426-
427412
# 4.3 Enable Randomized Virtual Memory Region Placement (Scored)
428413
- id: 1027
429414
title: "Enable Randomized Virtual Memory Region Placement"

sca/debian/cis_debian8.yml

Lines changed: 0 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -486,21 +486,6 @@ checks:
486486
- 'c:grep -Rh fs\.suid_dumpable /etc/sysctl.conf /etc/sysctl.d -> r:=\s*\t*0$'
487487
- 'c:grep -Rh ^*[[:space:]]*hard[[:space:]][[:space:]]*core[[:space:]][[:space:]]* /etc/security/limits.conf /etc/security/limits.d -> r:\s*\t*0$'
488488

489-
- id: 1529
490-
title: "Ensure XD/NX support is enabled"
491-
description: "Recent processors in the x86 family support the ability to prevent code execution on a per memory page basis. Generically and on AMD processors, this ability is called No Execute (NX), while on Intel processors it is called Execute Disable (XD). This ability can help prevent exploitation of buffer overflow vulnerabilities and should be activated whenever possible. Extra steps must be taken to ensure that this protection is enabled, particularly on 32-bit x86 systems. Other processors, such as Itanium and POWER, have included such support since inception and the standard kernel for those platforms supports the feature."
492-
rationale: "Enabling any feature that can protect against buffer overflow attacks enhances the security of the system."
493-
remediation: "On 32 bit systems install a kernel with PAE support, no installation is required on 64 bit systems: If necessary configure your bootloader to load the new kernel and reboot the system. You may need to enable NX or XD support in your bios."
494-
compliance:
495-
- cis: ["1.5.2"]
496-
- cis_csc: ["8.4"]
497-
- pci_dss: ["2.2.4"]
498-
- nist_800_53: ["CM.1"]
499-
- tsc: ["CC5.2"]
500-
condition: all
501-
rules:
502-
- 'c:dmesg -> r:NX \(Execute Disable\) protection: active'
503-
504489
- id: 1530
505490
title: "Ensure address space layout randomization (ASLR) is enabled"
506491
description: "Address space layout randomization (ASLR) is an exploit mitigation technique which randomly arranges the address space of key data areas of a process."

sca/debian/cis_debian9.yml

Lines changed: 0 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -474,21 +474,6 @@ checks:
474474
- 'c:grep -Rh fs\.suid_dumpable /etc/sysctl.conf /etc/sysctl.d -> !r:^# && r:=\s*\t*0$'
475475
- 'c:grep -Rh ^*[[:space:]]*hard[[:space:]][[:space:]]*core[[:space:]][[:space:]]* /etc/security/limits.conf /etc/security/limits.d -> r:\s*\t*0$'
476476

477-
- id: 2028
478-
title: "Ensure XD/NX support is enabled"
479-
description: "Recent processors in the x86 family support the ability to prevent code execution on a per memory page basis. Generically and on AMD processors, this ability is called No Execute (NX), while on Intel processors it is called Execute Disable (XD). This ability can help prevent exploitation of buffer overflow vulnerabilities and should be activated whenever possible. Extra steps must be taken to ensure that this protection is enabled, particularly on 32-bit x86 systems. Other processors, such as Itanium and POWER, have included such support since inception and the standard kernel for those platforms supports the feature."
480-
rationale: "Enabling any feature that can protect against buffer overflow attacks enhances the security of the system."
481-
remediation: "On 32 bit systems install a kernel with PAE support, no installation is required on 64 bit systems: If necessary configure your bootloader to load the new kernel and reboot the system. You may need to enable NX or XD support in your bios."
482-
compliance:
483-
- cis: ["1.5.2"]
484-
- cis_csc: ["8.3"]
485-
- pci_dss: ["2.2.4"]
486-
- nist_800_53: ["CM.1"]
487-
- tsc: ["CC5.2"]
488-
condition: all
489-
rules:
490-
- 'c:dmesg -> r:NX \(Execute Disable\) protection: active'
491-
492477
- id: 2029
493478
title: "Ensure address space layout randomization (ASLR) is enabled"
494479
description: "Address space layout randomization (ASLR) is an exploit mitigation technique which randomly arranges the address space of key data areas of a process."

sca/rhel/6/cis_rhel6_linux.yml

Lines changed: 0 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -614,22 +614,6 @@ checks:
614614
- 'c:sysctl fs.suid_dumpable -> r:^fs.suid_dumpable\s*=\s*0\s*$'
615615
- 'c:grep -Rh fs\.suid_dumpable /etc/sysctl.conf /etc/sysctl.d -> r:^\s*fs.suid_dumpable\s*=\s*0\s*$'
616616

617-
# 1.5.2 XD/NX enabled
618-
- id: 4034
619-
title: "Ensure XD/NX support is enabled"
620-
description: "Recent processors in the x86 family support the ability to prevent code execution on a per memory page basis. Generically and on AMD processors, this ability is called No Execute (NX), while on Intel processors it is called Execute Disable (XD). This ability can help prevent exploitation of buffer overflow vulnerabilities and should be activated whenever possible. Extra steps must be taken to ensure that this protection is enabled, particularly on 32-bit x86 systems. Other processors, such as Itanium and POWER, have included such support since inception and the standard kernel for those platforms supports the feature."
621-
rationale: "Enabling any feature that can protect against buffer overflow attacks enhances the security of the system."
622-
remediation: "On 32 bit systems install a kernel with PAE support, no installation is required on 64 bit systems: If necessary configure your bootloader to load the new kernel and reboot the system. You may need to enable NX or XD support in your bios."
623-
compliance:
624-
- cis: ["1.5.2"]
625-
- cis_csc: ["8.4"]
626-
- pci_dss: ["2.2.4"]
627-
- nist_800_53: ["CM.1"]
628-
- tsc: ["CC5.2"]
629-
condition: all
630-
rules:
631-
- 'c:dmesg -> r:NX \(Execute Disable\) protection: active'
632-
633617
# 1.5.3 Enable Randomized Virtual Memory Region Placement (Scored)
634618
- id: 4035
635619
title: "Ensure address space layout randomization (ASLR) is enabled"
@@ -3270,7 +3254,3 @@ the potential attack surface."
32703254
condition: none
32713255
rules:
32723256
- 'f:/etc/passwd -> !r:^# && !r:^\s*\t*root: && r:^\w+:\w+:0:'
3273-
3274-
3275-
3276-

sca/rhel/7/cis_rhel7_linux.yml

Lines changed: 0 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -661,23 +661,6 @@ checks:
661661
- 'c:sysctl fs.suid_dumpable -> r:^\s*fs.suid_dumpable\s*=\s*0\s*$'
662662
- 'c:grep -Rh fs\.suid_dumpable /etc/sysctl.conf /etc/sysctl.d -> r:^\s*fs.suid_dumpable\s*=\s*0\s*$'
663663

664-
# 1.6.2 XD/NX enabled
665-
- id: 4534
666-
title: "Ensure XD/NX support is enabled"
667-
description: "Recent processors in the x86 family support the ability to prevent code execution on a per memory page basis. Generically and on AMD processors, this ability is called No Execute (NX), while on Intel processors it is called Execute Disable (XD). This ability can help prevent exploitation of buffer overflow vulnerabilities and should be activated whenever possible. Extra steps must be taken to ensure that this protection is enabled, particularly on 32-bit x86 systems. Other processors, such as Itanium and POWER, have included such support since inception and the standard kernel for those platforms supports the feature."
668-
rationale: "Enabling any feature that can protect against buffer overflow attacks enhances the security of the system."
669-
remediation: "On 32 bit systems install a kernel with PAE support, no installation is required on 64 bit systems: If necessary configure your bootloader to load the new kernel and reboot the system. You may need to enable NX or XD support in your bios."
670-
compliance:
671-
- cis: ["1.6.2"]
672-
- cis_csc: ["8.3"]
673-
- pci_dss: ["2.2.4"]
674-
- nist_800_53: ["CM.1"]
675-
- tsc: ["CC5.2"]
676-
condition: any
677-
rules:
678-
- 'c:journalctl -> r:^kernel:\s+NX \(Execute Disable\) protection: active'
679-
- 'c:dmesg -> r:NX \(Execute Disable\) protection: active'
680-
681664
# 1.6.3 Enable Randomized Virtual Memory Region Placement (Scored)
682665
- id: 4535
683666
title: "Ensure address space layout randomization (ASLR) is enabled"

0 commit comments

Comments
 (0)