STIGQter STIGQter: STIG Summary: Red Hat Enterprise Linux 8 Security Technical Implementation Guide Version: 1 Release: 2 Benchmark Date: 23 Apr 2021:

RHEL 8 must require users to provide a password for privilege escalation.

DISA Rule

SV-230271r627750_rule

Vulnerability Number

V-230271

Group Title

SRG-OS-000373-GPOS-00156

Rule Version

RHEL-08-010380

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Remove any occurrence of "NOPASSWD" found in "/etc/sudoers" file or files in the "/etc/sudoers.d" directory.

Check Contents

Verify that "/etc/sudoers" has no occurrences of "NOPASSWD".

Check that the "/etc/sudoers" file has no occurrences of "NOPASSWD" by running the following command:

$ sudo grep -i nopasswd /etc/sudoers /etc/sudoers.d/*

%admin ALL=(ALL) NOPASSWD: ALL

If any occurrences of "NOPASSWD" are returned from the command and have not been documented with the ISSO as an organizationally defined administrative group utilizing MFA, this is a finding.

Vulnerability Number

V-230271

Documentable

False

Rule Version

RHEL-08-010380

Severity Override Guidance

Verify that "/etc/sudoers" has no occurrences of "NOPASSWD".

Check that the "/etc/sudoers" file has no occurrences of "NOPASSWD" by running the following command:

$ sudo grep -i nopasswd /etc/sudoers /etc/sudoers.d/*

%admin ALL=(ALL) NOPASSWD: ALL

If any occurrences of "NOPASSWD" are returned from the command and have not been documented with the ISSO as an organizationally defined administrative group utilizing MFA, this is a finding.

Check Content Reference

M

Target Key

2921

Comments