AIX7-00-002062 - AIX must remove !authenticate option from sudo config files.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

sudo command does not require reauthentication if !authenticate option is specified in /etc/sudoers config file, or config files in /etc/sudoers.d/ directory. With this tag in sudoers, users are not required to reauthenticate for privilege escalation.

Solution

Edit '/etc/sudoers' using 'visudo' command to remove all the '!authenticate' options:
# visudo -f /etc/sudoers

Editing a sudo config file that is in '/etc/sudoers.d/' directory and contains '!authenticate' options, use the 'visudo' command as follows:
# visudo -f /etc/sudoers.d/<config_file_name>

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_IBM_AIX_7-x_V2R6_STIG.zip

Item Details

References: CAT|II, CCI|CCI-002038, Rule-ID|SV-215261r508663_rule, STIG-ID|AIX7-00-002062, STIG-Legacy|SV-101637, STIG-Legacy|V-91539, Vuln-ID|V-215261

Plugin: Unix

Control ID: 528c35bc77383fa46565e8cd1fced01de17cd0febffd30bc67237272b5ed7bec