To verify that binaries cannot be directly executed from removable media, run the following command:
# grep noexec /etc/fstab
The output should show "noexec" in use. If it does not, this is a finding.
Fix Text (F-43605r1_fix)
The "noexec" mount option prevents the direct execution of binaries on the mounted filesystem. Users should not be allowed to execute binaries that exist on partitions mounted from removable media (such as a USB key). The "noexec" option prevents code from being executed directly from the media itself, and may therefore provide a line of defense against certain types of worms or malicious code. Add the "noexec" option to the fourth column of "/etc/fstab" for the line which controls mounting of any removable media partitions.