RHEL-09-432035 - RHEL 9 must restrict the use of the 'su' command.

Information

The 'su' program allows to run commands with a substitute user and group ID. It is commonly used to run commands as the root user. Limiting access to such commands is considered a good security practice.

Satisfies: SRG-OS-000373-GPOS-00156, SRG-OS-000312-GPOS-00123

Solution

Configure RHEL 9 to require users to be in the 'wheel' group to run 'su' command.

In file '/etc/pam.d/su', uncomment the following line:

'#auth required pam_wheel.so use_uid'

$ sed '/^[[:space:]]*#[[:space:]]*auth[[:space:]]+required[[:space:]]+pam_wheel.so[[:space:]]+use_uid$/s/^[[:space:]]*#//' -i /etc/pam.d/su

If necessary, create a 'wheel' group and add administrative users to the group.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/U_RHEL_9_V1R1_STIG.zip

Item Details

References: CAT|II, CCI|CCI-002038, CCI|CCI-002165, Rule-ID|SV-258088r926251_rule, STIG-ID|RHEL-09-432035, Vuln-ID|V-258088

Plugin: Unix

Control ID: 4ac3f3fb549a5c95124d4add8b8dd17656f8264cc8e4c2cd5e612f211fc00b8b