STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to Red Hat Enterprise Linux 10 Security Technical Implementation Guide

V-281323

CAT II (Medium)

RHEL 10 must disable file system automount function unless required.

Rule ID

SV-281323r1167119_rule

STIG

Red Hat Enterprise Linux 10 Security Technical Implementation Guide

Version

V1R1

CCIs

CCI-000778CCI-001958

Discussion

An authentication process resists replay attacks if it is impractical to achieve a successful authentication by recording and replaying a previous authentication message. Satisfies: SRG-OS-000114-GPOS-00059, SRG-OS-000378-GPOS-00163

Check Content

Note: If the "autofs" service is not installed, this requirement is not applicable.

Verify RHEL 10 is configured so that the file system automount function has been disabled with the following command:

$ systemctl is-enabled  autofs
masked

If the returned value is not "masked", "disabled", or "not-found" and is not documented as an operational requirement with the information system security officer, this is a finding.

Fix Text

Configure RHEL 10 to disable the ability to automount devices.

The "autofs" service can be disabled with the following command:

$ sudo systemctl mask --now autofs.service