RHEL-09-432035 - RHEL 9 must restrict the use of the 'su' command - su command.

Information

The 'su' program allows to run commands with a substitute user and group ID. It is commonly used to run commands as the root user. Limiting access to such commands is considered a good security practice.

Satisfies: SRG-OS-000373-GPOS-00156, SRG-OS-000312-GPOS-00123

Solution

Configure RHEL 9 to require users to be in the 'wheel' group to run 'su' command.

In file '/etc/pam.d/su', uncomment the following line:

'#auth required pam_wheel.so use_uid'

$ sed '/^[[:space:]]*#[[:space:]]*auth[[:space:]]+required[[:space:]]+pam_wheel.so[[:space:]]+use_uid$/s/^[[:space:]]*#//' -i /etc/pam.d/su

If necessary, create a 'wheel' group and add administrative users to the group.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_RHEL_9_V2R2_STIG.zip

Item Details

Category: ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

References: 800-53|AC-3(4), 800-53|IA-11, CAT|II, CCI|CCI-002038, CCI|CCI-002165, CCI|CCI-004895, Rule-ID|SV-258088r1015096_rule, STIG-ID|RHEL-09-432035, Vuln-ID|V-258088

Plugin: Unix

Control ID: 159b2375fde599194751c9560851ccadeaf9649877da7178bd09992cc90aa5d3