Check: AZLX-23-002440
Amazon Linux 2023 STIG:
AZLX-23-002440
(in version v1 r1)
Title
Amazon Linux 2023 must restrict the use of the "su" command. (Cat II impact)
Discussion
The "su" program allows to run commands with a substitute user and group ID. It is commonly used to run commands as the root user. Limiting access to such commands is considered a good security practice.
Check Content
Verify Amazon Linux 2023 requires uses to be members of the "wheel" group with the following command: $ grep pam_wheel /etc/pam.d/su auth required pam_wheel.so use_uid If a line for "pam_wheel.so" does not exist, or is commented out, this is a finding.
Fix Text
Configure Amazon Linux 2023 to require users to be in the "wheel" group to run "su" command. In file "/etc/pam.d/su", uncomment the following line: "#auth required pam_wheel.so use_uid" $ sudo sed '/^[[:space:]]*#[[:space:]]*auth[[:space:]]\+required[[:space:]]\+pam_wheel\.so[[:space:]]\+use_uid$/s/^[[:space:]]*#//' -i /etc/pam.d/su If necessary, create a "wheel" group and add administrative users to the group.
Additional Identifiers
Rule ID: SV-274151r1120441_rule
Vulnerability ID: V-274151
Group Title: SRG-OS-000312-GPOS-00123
Expert Comments
CCIs
| Number | Definition |
|---|---|
| CCI-002165 |
Enforce organization-defined discretionary access control policies over defined subjects and objects. |
Controls
| Number | Title |
|---|---|
| AC-3(4) |
Discretionary Access Control |