AIX7-00-002062 - AIX must remove !authenticate option from sudo config files.

Information

sudo command does not require reauthentication if !authenticate option is specified in /etc/sudoers config file, or config files in /etc/sudoers.d/ directory. With this tag in sudoers, users are not required to reauthenticate for privilege escalation.

Solution

Edit '/etc/sudoers' using 'visudo' command to remove all the '!authenticate' options:
# visudo -f /etc/sudoers

Editing a sudo config file that is in '/etc/sudoers.d/' directory and contains '!authenticate' options, use the 'visudo' command as follows:
# visudo -f /etc/sudoers.d/<config_file_name>

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_IBM_AIX_7-x_V2R9_STIG.zip

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-11, CAT|II, CCI|CCI-002038, Rule-ID|SV-215261r853469_rule, STIG-ID|AIX7-00-002062, STIG-Legacy|SV-101637, STIG-Legacy|V-91539, Vuln-ID|V-215261

Plugin: Unix

Control ID: 89825a74ce55030b82234cbb5044bc83816b7a7af38deddf955df3e0734b0220