RHEL 9 must require reauthentication when using the "sudo" command.

Overview

Finding IDVersionRule IDIA ControlsSeverity
V-258084RHEL-09-432015SV-258084r1050789_ruleCCI-004895medium
Description
Without reauthentication, users may access resources or perform tasks for which they do not have authorization. When operating systems provide the capability to escalate a functional capability, it is critical the organization requires the user to reauthenticate when using the "sudo" command. If the value is set to an integer less than "0", the user's time stamp will not expire and the user will not have to reauthenticate for privileged actions until the user's session is terminated.
STIGDate
Red Hat Enterprise Linux 9 Security Technical Implementation Guide2025-05-14

Details

Check Text (C-258084r1050789_chk)

Verify RHEL 9 requires reauthentication when using the "sudo" command to elevate privileges with the following command: $ sudo grep -ir 'timestamp_timeout' /etc/sudoers /etc/sudoers.d/ /etc/sudoers:Defaults timestamp_timeout=0 If results are returned from more than one file location, this is a finding. If "timestamp_timeout" is set to a negative number, is commented out, or no results are returned, this is a finding.

Fix Text (F-61749r1045170_fix)

Configure RHEL 9 to reauthenticate "sudo" commands after the specified timeout: Add the following line to "/etc/sudoers" or a file in "/etc/sudoers.d": Defaults timestamp_timeout=0