APPL-14-004022 - The macOS system must require users to reauthenticate for privilege escalation when using the "sudo" command.

Information

The file /etc/sudoers must include a timestamp_timout of 0.

Without reauthentication, users may access resources or perform tasks for which they do not have authorization. When operating systems provide the capability to escalate a functional capability or change user authenticators, it is critical the user reauthenticate.

Satisfies: SRG-OS-000373-GPOS-00156,SRG-OS-000373-GPOS-00157,SRG-OS-000373-GPOS-00158

Solution

Configure the macOS system to require reauthentication when using "sudo" with the following command:

/usr/bin/find /etc/sudoers* -type f -exec sed -i '' '/timestamp_timeout/d' '{}' ;
/bin/echo "Defaults timestamp_timeout=0" >> /etc/sudoers.d/mscp

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Apple_macOS_14_V2R2_STIG.zip

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-11, CAT|II, CCI|CCI-002038, CCI|CCI-004895, Rule-ID|SV-259555r1009606_rule, STIG-ID|APPL-14-004022, Vuln-ID|V-259555

Plugin: Unix

Control ID: 10c60735226410d18a7dc59fecee4960c0c0793c47aa550670696b85d079ba34