1.309 RHEL-09-432035

Information

RHEL 9 must restrict the use of the "su" command.

GROUP ID: V-258088
RULE ID: SV-258088r1050789

The "su" program allows to run commands with a substitute user and group ID. It is commonly used to run commands as the root user. Limiting access to such commands is considered a good security practice.

Satisfies: SRG-OS-000373-GPOS-00156, SRG-OS-000312-GPOS-00123

Solution

Configure RHEL 9 to require users to be in the "wheel" group to run "su" command.

In file "/etc/pam.d/su", uncomment the following line:

"#auth required pam_wheel.so use_uid"

$ sed '/^[[:space:]]*#[[:space:]]*auth[[:space:]]\+required[[:space:]]\+pam_wheel\.so[[:space:]]\+use_uid$/s/^[[:space:]]*#//' -i /etc/pam.d/su

If necessary, create a "wheel" group and add administrative users to the group.

See Also

https://workbench.cisecurity.org/benchmarks/22008

Item Details

Category: ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

References: 800-53|AC-3(4), 800-53|IA-11, CAT|II, CCI|CCI-002038, CCI|CCI-002165, CCI|CCI-004895, Rule-ID|SV-258088r1050789_rule, STIG-ID|RHEL-09-432035, Vuln-ID|V-258088

Plugin: Unix

Control ID: 519c432d7225d9750fcfc417133cf92bbf0780685786e29d893fb6eb94ee3535