Check: AZLX-23-002440
Amazon Linux 2023 STIG:
AZLX-23-002440
(in versions v1 r2 through v1 r1)
Title
Amazon Linux 2023 must restrict the use of the "su" command. (Cat II impact)
Discussion
The "su" program allows to run commands with a substitute user and group ID. It is commonly used to run commands as the root user. Limiting access to such commands is considered a good security practice.
Check Content
Verify Amazon Linux 2023 requires uses to be members of the "wheel" group with the following command: $ grep pam_wheel /etc/pam.d/su auth required pam_wheel.so use_uid If a line for "pam_wheel.so" does not exist, or is commented out, this is a finding.
Fix Text
Configure Amazon Linux 2023 to require users to be in the "wheel" group to run "su" command. In file "/etc/pam.d/su", uncomment the following line: "#auth required pam_wheel.so use_uid" $ sudo sed '/^[[:space:]]*#[[:space:]]*auth[[:space:]]\+required[[:space:]]\+pam_wheel\.so[[:space:]]\+use_uid$/s/^[[:space:]]*#//' -i /etc/pam.d/su If necessary, create a "wheel" group and add administrative users to the group.
Additional Identifiers
Rule ID: SV-274151r1120441_rule
Vulnerability ID: V-274151
Group Title: SRG-OS-000312-GPOS-00123
Expert Comments
CCIs
| Number | Definition |
|---|---|
| CCI-002165 |
Enforce organization-defined discretionary access control policies over defined subjects and objects. |
Controls
| Number | Title |
|---|---|
| AC-3(4) |
Discretionary Access Control |