services: improve default hardening
This commit is contained in:
parent
3b938a909f
commit
d56a363d3d
|
@ -15,6 +15,11 @@ let self = {
|
||||||
MemoryDenyWriteExecute = "true";
|
MemoryDenyWriteExecute = "true";
|
||||||
ProtectKernelTunables = "true";
|
ProtectKernelTunables = "true";
|
||||||
ProtectKernelModules = "true";
|
ProtectKernelModules = "true";
|
||||||
|
ProtectKernelLogs = "true";
|
||||||
|
ProtectClock = "true";
|
||||||
|
# Test and enable these when systemd v247 is available
|
||||||
|
# ProtectProc = "invisible";
|
||||||
|
# ProcSubset = "pid";
|
||||||
ProtectControlGroups = "true";
|
ProtectControlGroups = "true";
|
||||||
RestrictAddressFamilies = "AF_UNIX AF_INET AF_INET6";
|
RestrictAddressFamilies = "AF_UNIX AF_INET AF_INET6";
|
||||||
RestrictNamespaces = "true";
|
RestrictNamespaces = "true";
|
||||||
|
|
Loading…
Reference in New Issue
Block a user