TOSS must restrict privilege elevation to authorized personnel.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-253133 | TOSS-04-040920 | SV-253133r991589_rule | CCI-000366 | medium |
| Description | ||||
| The sudo command allows a user to execute programs with elevated (administrator) privileges. It prompts the user for their password and confirms the request to execute a command by checking a file, called sudoers. If the "sudoers" file is not configured correctly, any user defined on the system can initiate privileged actions on the target system. | ||||
| STIG | Date | |||
| Tri-Lab Operating System Stack (TOSS) 4 Security Technical Implementation Guide | 2025-05-08 | |||
Details
Check Text (C-253133r991589_chk)
Verify the "sudoers" file restricts sudo access to authorized personnel.
$ sudo grep -iwr 'ALL[[:blank:]]\+ALL' /etc/sudoers /etc/sudoers.d
If the either of the following entries are returned, this is a finding:
ALL ALL=(ALL) ALL
ALL ALL=(ALL:ALL) ALL
Fix Text (F-56536r825070_fix)
Remove the following entries from the sudoers file:
ALL ALL=(ALL) ALL
ALL ALL=(ALL:ALL) ALL