Audits
Settings
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Theme
Light
Dark
Auto
Help
Plugins
Overview
Plugins Pipeline
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Release Notes
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Settings
Theme
Light
Dark
Auto
Detections
Plugins
Overview
Plugins Pipeline
Release Notes
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
Analytics
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Audits
References
CCI
CCI-002227
CCI
CCI|CCI-002227
Title
Restrict privileged accounts on the system to organization-defined personnel or roles.
Reference Item Details
Reference:
CCI - DISA Control Correlation Identifier
Category:
2024
Audit Items
View all Reference Audit Items
Name
Plugin
Audit Name
5.2.8 Ensure users password required for privilege escalation when using sudo - rootpw
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
5.2.8 Ensure users password required for privilege escalation when using sudo - runaspw
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
5.2.8 Ensure users password required for privilege escalation when using sudo - targetpw
Unix
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
OL6-00-000536 - The Oracle Linux operating system must use the invoking user's password for privilege escalation when using 'sudo' - rootpw
Unix
DISA STIG Oracle Linux 6 v2r7
OL6-00-000536 - The Oracle Linux operating system must use the invoking user's password for privilege escalation when using 'sudo' - runaspw
Unix
DISA STIG Oracle Linux 6 v2r7
OL6-00-000536 - The Oracle Linux operating system must use the invoking user's password for privilege escalation when using 'sudo' - targetpw
Unix
DISA STIG Oracle Linux 6 v2r7
OL07-00-010342 - The Oracle Linux operating system must use the invoking user's password for privilege escalation when using 'sudo'.
Unix
DISA Oracle Linux 7 STIG v2r14
RHEL-07-010342 - The Red Hat Enterprise Linux operating system must use the invoking user's password for privilege escalation when using 'sudo' - sudo.
Unix
DISA Red Hat Enterprise Linux 7 STIG v3r15
RHEL-08-010383 - RHEL 8 must use the invoking user's password for privilege escalation when using 'sudo' - sudo.
Unix
DISA Red Hat Enterprise Linux 8 STIG v2r1
SLES-12-010112 - The SUSE operating system must use the invoking user's password for privilege escalation when using 'sudo'.
Unix
DISA SLES 12 STIG v2r13
WPAW-00-000400 - Administrative accounts of all high-value IT resources must be assigned to a specific administrative tier in Active Directory to separate highly privileged administrative accounts from less privileged administrative accounts.
Windows
DISA MS Windows Privileged Access Workstation v3r1