Difference between revisions of "Microsoft CBL-Mariner OS Security Features"
		
		
		
		
		
		Jump to navigation
		Jump to search
		
				
		
	
	
        
		
	
| m (DochyJP moved page CBL-Mariner OS Security Features to Microsoft CBL-Mariner OS Security Features without leaving a redirect) | |
| (No difference) | |
Latest revision as of 06:58, 3 April 2022
| Source: | DataSource | 
|---|---|
| Language: | English | 
| Topic: | Microsoft | 
| SubTopic: | CBL-Mariner Linux | 
| Last Edit By: | DochyJP | 
| LastEdit: | 2022-04-03 | 
| Document type: | Documentation | 
| Status: | Active | 
| Access: | free | 
Microsoft CBL-Mariner Operating System Security Features
| Element | Description | ||
|---|---|---|---|
| Networking | |||
| Configurable Firewall | By default | iptables | |
| SYN cookies | By default | CONFIG_SYN_COOKIES=y | |
| Updates | Signed updates | By default | tdnf, dnf | 
| Build options | |||
| Built as PIE | By default | -fPIE, -pie | |
| Built with Stack Protector Strong | By default | -fstack-protector, -fstack-protector-strong | |
| Built with Format Security | By default | -Wformat-security | |
| Built with Fortify Source | By default | _FORTIFY_SOURCE | |
| Built with --enable-bind-now | By default | --enable-bind-now | |
| Built with RELRO | By default | relro | |
| Address Space Layout Randomization (ASLR) | |||
| Stack ASLR | By default | Available in the mainline kernel since 2.6.15 | |
| Libs/mmap ASLR | By default | Available in the mainline kernel since 2.6.15 | |
| Exec ASLR | By default | Available in the mainline kernel since 2.6.25 | |
| brk ASLR | By default | Available in the mainline kernel since 2.6.22 | |
| VDSO ASLR | By default | Available for x86_64 in the mainline kernel since 2.6.22 | |
| Kernel hardening | |||
| /proc/$pid/maps protection | By default | Enabled by default since mainline kernel 2.6.27 | |
| Symlink restrictions | By default | fs.protected_symlinks | |
| Hardlink restrictions | By default | fs.protected_hardlinks | |
| 0-address protection | By default | vm.mmap_min_addr | |
| Kernel Address Display Restriction | By default | kernel.kptr_restrict | |
| Block module loading | Available | kernel.modules_disabled | |
| /dev/mem protection | By default | CONFIG_STRICT_DEVMEM=y | |
| /dev/kmem disabled | By default | CONFIG_DEVKMEM=n | |
| Kernel Module RO/NX | By default | CONFIG_STRICT_MODULE_RWX=y | |
| Write-protect kernel .rodata sections | By default | CONFIG_STRICT_KERNEL_RWX=y | |
| Kernel Stack Protector | By default | CONFIG_STACKPROTECTOR=y | |
| gcc/glibc hardening | |||
| Overflow checking in new operator | By default | gcc | |
| Pointer Obfuscation | By default | glibc pointer encryption | |
| Heap Consistency Checking | By default | glibc Heap Consistency Checking | |
| System call filtering | |||
| Syscall Filtering (seccomp) | Available | CONFIG_SECCOMP_FILTER=y | |
| Seccomp sandbox | Available | PR_SET_SECCOMP | |
| Process isolation | |||
| Ptrace Mitigation | Available | Yama | |
| User namespaces | Available | CONFIG_USER_NS=y | |
| Private /tmp for systemd services | Available | PrivateTmp | |
| Polyinstantiate /tmp, /var/tmp, and user home folders | Available | namespace.conf | |
| Mandatory access control | By default | SELinux | |
| Encrypted Storage | Encrypted Volumes | Available | Encrypt during OS installation | 
| Miscellaneous | |||
| Password hashing | By default | SHA-512 | |
| Filesystem Capabilities | Available | Capabilities and chattr | |
| Tamper Resistant Logs | Available | journalctl --verify | |
| Kernel Lockdown | Integrity mode by default | kernel lockdown | |