RHEL-06-000529 - The sudo command must require authentication - /etc/sudoers.d/* !authenticate

Information

The 'sudo' command allows authorized users to run programs (including shells) as other users, system users, and root. The '/etc/sudoers' file is used to configure authorized 'sudo' users as well as the programs they are allowed to run. Some configuration options in the '/etc/sudoers' file allow configured users to run programs without re-authenticating. Use of these configuration options makes it easier for one compromised account to be used to compromise other accounts.

Solution

Update the '/etc/sudoers' or other sudo configuration files to remove or comment out lines utilizing the 'NOPASSWD' and '!authenticate' options.

# visudo
# visudo -f [other sudo configuration file]

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_RHEL_6_V2R2_STIG.zip

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-11, CAT|II, CCI|CCI-002038, Rule-ID|SV-218107r603264_rule, STIG-ID|RHEL-06-000529, STIG-Legacy|SV-73331, STIG-Legacy|V-58901, Vuln-ID|V-218107

Plugin: Unix

Control ID: ea93a3e828b5806375c3612090bc0e3b42743f04c407a223729349ad409ef969