STIGQter STIGQter: STIG Summary: SLES 12 Security Technical Implementation Guide Version: 1 Release: 4 Benchmark Date: 24 Jan 2020: The SUSE operating system must reauthenticate users when changing authenticators, roles, or escalating privileges.

DISA Rule

SV-91763r2_rule

Vulnerability Number

V-77067

Group Title

SRG-OS-000373-GPOS-00156

Rule Version

SLES-12-010110

Severity

CAT I

CCI(s)

Weight

10

Fix Recommendation

Configure the SUSE operating system to remove any occurrence of "NOPASSWD" or "!authenticate" found in the "/etc/sudoers" file. If the system does not use passwords for authentication, the "NOPASSWD" tag may exist in the file.

Check Contents

Verify that the SUSE operating system requires reauthentication when changing authenticators, roles, or escalating privileges.

Check that "/etc/sudoers" has no occurrences of "NOPASSWD" or "!authenticate" with the following command:

# sudo egrep -i '(nopasswd|!authenticate)' /etc/sudoers
%wheel ALL=(ALL) NOPASSWD: ALL

If any occurrences of "!authenticate" are returned, or occurrences of "NOPASSWD" are returned and active accounts on the system have valid passwords, this is a finding.

Vulnerability Number

V-77067

Documentable

False

Rule Version

SLES-12-010110

Severity Override Guidance

Verify that the SUSE operating system requires reauthentication when changing authenticators, roles, or escalating privileges.

Check that "/etc/sudoers" has no occurrences of "NOPASSWD" or "!authenticate" with the following command:

# sudo egrep -i '(nopasswd|!authenticate)' /etc/sudoers
%wheel ALL=(ALL) NOPASSWD: ALL

If any occurrences of "!authenticate" are returned, or occurrences of "NOPASSWD" are returned and active accounts on the system have valid passwords, this is a finding.

Check Content Reference

M

Target Key

2903

Comments