Profile Applicability:
 • Level 1

Description:
 The 
rpcbind service maps RPC program numbers to network addresses. If not required, disabling rpcbind reduces the system’s attack surface and mitigates risks associated with unauthorized RPC access.

Rationale:
 Disabling unused 
rpcbind services helps prevent exploitation of RPC-related vulnerabilities and limits unnecessary network exposure.

Impact:
 Pros:

  • Minimizes network services and reduces attack vectors.

  • Enhances system security by limiting RPC access.

Cons:

  • Disabling rpcbind on systems that require RPC may disrupt functionality.

Default Value:
 
rpcbind service may be enabled by default on some systems.

Pre-requisites:

  • Root or sudo privileges to manage system services.

Remediation:

Test Plan:

Using Linux command line:

1. Check if rpcbind service is enabled:

systemctl is-enabled rpcbind

2. Check if rpcbind service is running:

systemctl status rpcbind

Implementation Plan:

Using Linux command line:

1. Disable the rpcbind service:

systemctl disable rpcbind

2. Stop the running rpcbind service:

systemctl stop rpcbind

3. Verify service is disabled and stopped:

systemctl is-enabled rpcbind  
systemctl status rpcbind

Backout Plan:

Using Linux command line:

1. Enable and start the rpcbind service if required:

systemctl enable rpcbind  
systemctl start rpcbind

2. Verify service status.

References:

  • CIS Amazon Linux 2 Benchmark v3.0.0

  • Systemd Service Management