RHEL-09-611085 - RHEL 9 must require users to provide a password for privilege escalation.

Information

Without reauthentication, users may access resources or perform tasks for which they do not have authorization.

When operating systems provide the capability to escalate a functional capability, it is critical that the user reauthenticate.

Satisfies: SRG-OS-000373-GPOS-00156, SRG-OS-000373-GPOS-00157, SRG-OS-000373-GPOS-00158

Solution

Configure RHEL 9 to not allow users to execute privileged actions without authenticating with a password.

Remove any occurrence of 'NOPASSWD' found in '/etc/sudoers' file or files in the '/etc/sudoers.d' directory.

$ sudo sed -i '/NOPASSWD/ s/^/# /g' /etc/sudoers /etc/sudoers.d/*

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_RHEL_9_V2R2_STIG.zip

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-11, CAT|II, CCI|CCI-002038, CCI|CCI-004895, Rule-ID|SV-258106r1015106_rule, STIG-ID|RHEL-09-611085, Vuln-ID|V-258106

Plugin: Unix

Control ID: de438c9de91dc2eafb2ccf8b6f87de41535dc4a31d4992a18e6570e443c80fd7