Bash
In this section, you will find a list of the rules associated with the Bash language and the security requirements.
Method | Security Requirement |
---|---|
BASH_IMAGE_HAS_DIGEST | 266. Disable insecure functionalities. |
BASH_USING_SSHPASS | 145. Protect system cryptographic keys 156. Source code without sensitive information 266. Disable insecure functionalities |
BASH_EXCESSIVE_PRIVILEGES_FOR_OTHERS | 033. Restrict administrative access 176. Restrict system objects 265. Restrict access to critical processes 280. Restrict service root directory |