RHEL-09-611085 - RHEL 9 must require users to provide a password for privilege escalation.

Information

Without reauthentication, users may access resources or perform tasks for which they do not have authorization.

When operating systems provide the capability to escalate a functional capability, it is critical that the user reauthenticate.

Satisfies: SRG-OS-000373-GPOS-00156, SRG-OS-000373-GPOS-00157, SRG-OS-000373-GPOS-00158

Solution

Configure RHEL 9 to not allow users to execute privileged actions without authenticating with a password.

Remove any occurrence of 'NOPASSWD' found in '/etc/sudoers' file or files in the '/etc/sudoers.d' directory.

$ sudo sed -i '/NOPASSWD/ s/^/# /g' /etc/sudoers /etc/sudoers.d/*

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_RHEL_9_V1R3_STIG.zip

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-11, CAT|II, CCI|CCI-002038, Rule-ID|SV-258106r926305_rule, STIG-ID|RHEL-09-611085, Vuln-ID|V-258106

Plugin: Unix

Control ID: f715e460bf6e848cf18d10a6271b1f734564dc88f1f04656623f6a5976136df4