From Micylou WIKI
		This is the latest revision of this page; it has no approved revision.
		
		
		
		Jump to navigation
		Jump to search
		
Microsoft CBL-Mariner Operating System Security Features
| Element | Description | 
| Networking | 
| Configurable Firewall | By default | iptables | 
| SYN cookies | By default | CONFIG_SYN_COOKIES=y | 
| Updates | Signed updates | By default | tdnf, dnf | 
| Build options | 
| Built as PIE | By default | -fPIE, -pie | 
| Built with Stack Protector Strong | By default | -fstack-protector, -fstack-protector-strong | 
| Built with Format Security | By default | -Wformat-security | 
| Built with Fortify Source | By default | _FORTIFY_SOURCE | 
| Built with --enable-bind-now | By default | --enable-bind-now | 
| Built with RELRO | By default | relro | 
| Address Space Layout Randomization (ASLR) | 
| Stack ASLR | By default | Available in the mainline kernel since 2.6.15 | 
| Libs/mmap ASLR | By default | Available in the mainline kernel since 2.6.15 | 
| Exec ASLR | By default | Available in the mainline kernel since 2.6.25 | 
| brk ASLR | By default | Available in the mainline kernel since 2.6.22 | 
| VDSO ASLR | By default | Available for x86_64 in the mainline kernel since 2.6.22 | 
| Kernel hardening | 
| /proc/$pid/maps protection | By default | Enabled by default since mainline kernel 2.6.27 | 
| Symlink restrictions | By default | fs.protected_symlinks | 
| Hardlink restrictions | By default | fs.protected_hardlinks | 
| 0-address protection | By default | vm.mmap_min_addr | 
| Kernel Address Display Restriction | By default | kernel.kptr_restrict | 
| Block module loading | Available | kernel.modules_disabled | 
| /dev/mem protection | By default | CONFIG_STRICT_DEVMEM=y | 
| /dev/kmem disabled | By default | CONFIG_DEVKMEM=n | 
| Kernel Module RO/NX | By default | CONFIG_STRICT_MODULE_RWX=y | 
| Write-protect kernel .rodata sections | By default | CONFIG_STRICT_KERNEL_RWX=y | 
| Kernel Stack Protector | By default | CONFIG_STACKPROTECTOR=y | 
| gcc/glibc hardening | 
| Overflow checking in new operator | By default | gcc | 
| Pointer Obfuscation | By default | glibc pointer encryption | 
| Heap Consistency Checking | By default | glibc Heap Consistency Checking | 
| System call filtering | 
| Syscall Filtering (seccomp) | Available | CONFIG_SECCOMP_FILTER=y | 
| Seccomp sandbox | Available | PR_SET_SECCOMP | 
| Process isolation | 
| Ptrace Mitigation | Available | Yama | 
| User namespaces | Available | CONFIG_USER_NS=y | 
| Private /tmp for systemd services | Available | PrivateTmp | 
| Polyinstantiate /tmp, /var/tmp, and user home folders | Available | namespace.conf | 
| Mandatory access control | By default | SELinux | 
| Encrypted Storage | Encrypted Volumes | Available | Encrypt during OS installation | 
| Miscellaneous | 
| Password hashing | By default | SHA-512 | 
| Filesystem Capabilities | Available | Capabilities and chattr | 
| Tamper Resistant Logs | Available | journalctl --verify | 
| Kernel Lockdown | Integrity mode by default | kernel lockdown |