APPL-14-004022 The macOS system must require users to reauthenticate for privilege escalation when using the "sudo" command.

Information

The file /etc/sudoers must include a timestamp_timout of 0.

Without reauthentication, users may access resources or perform tasks for which they do not have authorization. When operating systems provide the capability to escalate a functional capability or change user authenticators, it is critical the user reauthenticate.

Satisfies: SRG-OS-000373-GPOS-00156,SRG-OS-000373-GPOS-00157,SRG-OS-000373-GPOS-00158

Solution

Configure the macOS system to require reauthentication when using "sudo" with the following command:

/usr/bin/find /etc/sudoers* -type f -exec sed -i '' '/timestamp_timeout/d' '{}' ;
/bin/echo "Defaults timestamp_timeout=0" >> /etc/sudoers.d/mscp

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Apple_macOS_14_V2R3_STIG.zip

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-11, CAT|II, CCI|CCI-002038, CCI|CCI-004895, Rule-ID|SV-259555r1050789_rule, STIG-ID|APPL-14-004022, Vuln-ID|V-259555

Plugin: Unix

Control ID: e2f3219032b3afe05a668bf2a55a377749b830fde2c10a8b065c586d736910b7