Check: SLEM-05-432020
SUSE Linux Enterprise Micro (SLEM) 5 STIG:
SLEM-05-432020
(in version v1 r1)
Title
SLEM 5 must require reauthentication when using the "sudo" command. (Cat II impact)
Discussion
Without reauthentication, users may access resources or perform tasks for which they do not have authorization. When operating systems provide the capability to escalate a functional capability, it is critical the organization requires the user to reauthenticate when using the "sudo" command. If the value is set to an integer less than 0, the user's time stamp will not expire and the user will not have to reauthenticate for privileged actions until the user's session is terminated.
Check Content
Verify SLEM 5 requires reauthentication when using the "sudo" command to elevate privileges with the following command: > sudo grep -ir 'timestamp_timeout' /etc/sudoers /etc/sudoers.d /etc/sudoers:Defaults timestamp_timeout=0 If "timestamp_timeout" is set to a negative number, is commented out, conflicting results are returned, or no results are returned, this is a finding.
Fix Text
Configure the "sudo" command to require reauthentication. Add or modify the following line in the "/etc/sudoers" file: Defaults timestamp_timeout=<value> Note: The "<value>" must be a number that is greater than or equal to "0".
Additional Identifiers
Rule ID: SV-261374r996560_rule
Vulnerability ID: V-261374
Group Title: SRG-OS-000373-GPOS-00156
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-002038 |
The organization requires users to reauthenticate upon organization-defined circumstances or situations requiring reauthentication. |
Controls
Number | Title |
---|---|
IA-11 |
Re-authentication |