NixOS must require users to reauthenticate for privilege escalation.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-268155 | ANIX-00-001500 | SV-268155r1131113_rule | CCI-000366 | medium |
| Description | ||||
| Without reauthentication, users may access resources or perform tasks for which they do not have authorization. When operating systems provide the capability to escalate a functional capability, it is critical the user reauthenticate. | ||||
| STIG | Date | |||
| Anduril NixOS Security Technical Implementation Guide | 2025-08-19 | |||
Details
Check Text (C-268155r1131113_chk)
Verify NixOS enforces reauthentication with sudo with the following command:
$ sudo grep timestamp_timeout /etc/sudoers
Defaults timestamp_timeout=0
If "timestamp_timeout" is greater than 0, is commented out, or is missing, this is a finding.
Fix Text (F-71982r1131112_fix)
Configure NixOS to enforce reauthentication with sudo.
Add the following Nix code to the NixOS Configuration, usually located in /etc/nixos/configuration.nix or /etc/nixos/flake.nix:
security.sudo.extraConfig = ''
Defaults timestamp_timeout=0
'';
Rebuild and switch to the new NixOS configuration:
$ sudo nixos-rebuild switch