Alertonotify hardening part 3
This commit is contained in:
@@ -19,19 +19,25 @@
|
|||||||
serviceConfig = {
|
serviceConfig = {
|
||||||
Type = "exec";
|
Type = "exec";
|
||||||
ExecStart = "${pkgs.alerttonotify}/bin/alerttonotify";
|
ExecStart = "${pkgs.alerttonotify}/bin/alerttonotify";
|
||||||
DynamicUser = "yes";
|
|
||||||
CapabilityBoundingSet = "";
|
CapabilityBoundingSet = "";
|
||||||
RestrictAddressFamilies = "AF_INET AF_INET6";
|
DynamicUser = "yes";
|
||||||
SystemCallArchitectures = "native";
|
LoadCredential = "nats_nkey:/run/secrets/nats_nkey";
|
||||||
LockPersonality = "yes";
|
LockPersonality = "yes";
|
||||||
MemoryDenyWriteExecute = "yes";
|
MemoryDenyWriteExecute = "yes";
|
||||||
PrivateDevices = "yes";
|
PrivateDevices = "yes";
|
||||||
PrivateUsers = "yes";
|
PrivateUsers = "yes";
|
||||||
|
ProtectClock = "yes";
|
||||||
ProtectControlGroups = "yes";
|
ProtectControlGroups = "yes";
|
||||||
ProtectHome = "yes";
|
ProtectHome = "yes";
|
||||||
ProtectHostname = "yes";
|
ProtectHostname = "yes";
|
||||||
RestrictNamespace = "yes";
|
ProtectKernelLogs = "yes";
|
||||||
LoadCredential = "nats_nkey:/run/secrets/nats_nkey";
|
ProtectKernelModules = "yes";
|
||||||
|
RestrictAddressFamilies = "AF_INET AF_INET6";
|
||||||
|
RestrictNamespaces = "yes";
|
||||||
|
RestrictRealtime = "yes";
|
||||||
|
SystemCallArchitectures = "native";
|
||||||
|
SystemCallFilter = "~@privileged";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
Reference in New Issue
Block a user