STIGQter STIGQter: STIG Summary: Oracle Linux 7 Security Technical Implementation Guide Version: 2 Release: 3 Benchmark Date: 23 Apr 2021:

The Oracle Linux operating system must be configured so users must re-authenticate for privilege escalation.

DISA Rule

SV-228569r603260_rule

Vulnerability Number

V-228569

Group Title

SRG-OS-000373-GPOS-00156

Rule Version

OL07-00-010350

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the operating system to require users to reauthenticate for privilege escalation.

Check the configuration of the "/etc/sudoers" file with the following command:

# visudo
Remove any occurrences of "!authenticate" tags in the file.

Check the configuration of the "/etc/sudoers.d/*" files with the following command:

# grep -i authenticate /etc/sudoers /etc/sudoers.d/*
Remove any occurrences of "!authenticate" tags in the file(s).

Check Contents

Verify the operating system requires users to reauthenticate for privilege escalation.

Check the configuration of the "/etc/sudoers" and "/etc/sudoers.d/*" files with the following command:

# grep -i authenticate /etc/sudoers /etc/sudoers.d/*

If any uncommented line is found with a "!authenticate" tag, this is a finding.

Vulnerability Number

V-228569

Documentable

False

Rule Version

OL07-00-010350

Severity Override Guidance

Verify the operating system requires users to reauthenticate for privilege escalation.

Check the configuration of the "/etc/sudoers" and "/etc/sudoers.d/*" files with the following command:

# grep -i authenticate /etc/sudoers /etc/sudoers.d/*

If any uncommented line is found with a "!authenticate" tag, this is a finding.

Check Content Reference

M

Target Key

4089

Comments