From 80cee70a289588a9dc7c8f9431f073c4ce54c5f7 Mon Sep 17 00:00:00 2001
From: Vojtech Polasek <vpolasek@redhat.com>
Date: Tue, 20 Apr 2021 11:32:54 +0200
Subject: [PATCH 01/10] add rhel7 stig references and update description
---
linux_os/guide/system/software/sudo/sudo_restrict_privilege_elevation_to_authorized/rule.yml | 9 ++++++++-
shared/references/cce-redhat-avail.txt | 1 -
2 files changed, 8 insertions(+), 2 deletions(-)
diff --git a/linux_os/guide/system/software/sudo/sudo_restrict_privilege_elevation_to_authorized/rule.yml b/linux_os/guide/system/software/sudo/sudo_restrict_privilege_elevation_to_authorized/rule.yml
index db1d4fc79cb..d13d24dc229 100644
--- a/linux_os/guide/system/software/sudo/sudo_restrict_privilege_elevation_to_authorized/rule.yml
+++ b/linux_os/guide/system/software/sudo/sudo_restrict_privilege_elevation_to_authorized/rule.yml
@@ -2,13 +2,16 @@ documentation_complete: true
title: 'The operating system must restrict privilege elevation to authorized personnel'
-prodtype: sle15
+prodtype: ol7,rhel7,sle15
description: |-
The sudo command allows a user to execute programs with elevated
(administrator) privileges. It prompts the user for their password
and confirms your request to execute a command by checking a file,
called sudoers.
+ Restrict privileged actions by removing the following entries from the sudoers file:
+ <tt>ALL ALL=(ALL) ALL</tt>
+ <tt>ALL ALL=(ALL:ALL) ALL</tt>
rationale: |-
If the "sudoers" file is not configured correctly, any user defined
@@ -18,11 +21,15 @@ severity: medium
identifiers:
cce@sle15: CCE-85712-8
+ cce@rhel7: CCE-83423-4
references:
nist: CM-6(b),CM-6(iv)
disa@sle15: CCI-000366
stig@sle15: SLES-15-020101
+ disa@rhel7: CCI-000366
+ stigid@rhel7: RHEL-07-010341
+ srg: SRG-OS-000480-GPOS-00227
ocil_clause: '/etc/sudoers file does not restrict sudo access to authorized personnel'
diff --git a/shared/references/cce-redhat-avail.txt b/shared/references/cce-redhat-avail.txt
index 7ad068fc611..257b07d1f0b 100644
--- a/shared/references/cce-redhat-avail.txt
+++ b/shared/references/cce-redhat-avail.txt
@@ -7,7 +7,6 @@
CCE-83407-7
CCE-83421-8
CCE-83422-6
-CCE-83423-4
CCE-83425-9
CCE-83426-7
CCE-83428-3
From 277abe35785e38337d8c17d46b8ca0372eac2f6d Mon Sep 17 00:00:00 2001
From: Vojtech Polasek <vpolasek@redhat.com>
Date: Tue, 20 Apr 2021 11:36:33 +0200
Subject: [PATCH 02/10] fix sle15 reference
---
linux_os/guide/system/software/sudo/sudo_restrict_privilege_elevation_to_authorized/rule.yml | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/linux_os/guide/system/software/sudo/sudo_restrict_privilege_elevation_to_authorized/rule.yml b/linux_os/guide/system/software/sudo/sudo_restrict_privilege_elevation_to_authorized/rule.yml
index d13d24dc229..73812cccd83 100644
--- a/linux_os/guide/system/software/sudo/sudo_restrict_privilege_elevation_to_authorized/rule.yml
+++ b/linux_os/guide/system/software/sudo/sudo_restrict_privilege_elevation_to_authorized/rule.yml
@@ -26,7 +26,7 @@ identifiers:
references:
nist: CM-6(b),CM-6(iv)
disa@sle15: CCI-000366
- stig@sle15: SLES-15-020101
+ stigid@sle15: SLES-15-020101
disa@rhel7: CCI-000366
stigid@rhel7: RHEL-07-010341
srg: SRG-OS-000480-GPOS-00227
From d3c3c0eea1d8eac57fc517ec9209854f2ae23353 Mon Sep 17 00:00:00 2001
From: Vojtech Polasek <vpolasek@redhat.com>
Date: Tue, 20 Apr 2021 11:36:56 +0200
Subject: [PATCH 03/10] add rule to the profile
---
rhel7/profiles/stig.profile | 1 +
1 file changed, 1 insertion(+)
diff --git a/rhel7/profiles/stig.profile b/rhel7/profiles/stig.profile
index fc4dbb12e11..b0def70fd01 100644
--- a/rhel7/profiles/stig.profile
+++ b/rhel7/profiles/stig.profile
@@ -104,6 +104,7 @@ selections:
- accounts_passwords_pam_faillock_deny
- accounts_passwords_pam_faillock_deny_root
- sudo_remove_nopasswd
+ - sudo_restrict_privilege_elevation_to_authorized
- sudo_remove_no_authenticate
- accounts_logon_fail_delay
- gnome_gdm_disable_automatic_login
From a22162a02358b15d840fba8a57eb5b3006ed67e4 Mon Sep 17 00:00:00 2001
From: Vojtech Polasek <vpolasek@redhat.com>
Date: Tue, 20 Apr 2021 11:49:46 +0200
Subject: [PATCH 04/10] update test applicability
---
linux_os/guide/system/software/sudo/sudo_restrict_privilege_elevation_to_authorized/tests/simple.fail.sh | 1 +
linux_os/guide/system/software/sudo/sudo_restrict_privilege_elevation_to_authorized/tests/simple.pass.sh | 2 +-
linux_os/guide/system/software/sudo/sudo_restrict_privilege_elevation_to_authorized/tests/sudoers_d.fail.sh | 2 +-
3 files changed, 3 insertions(+), 2 deletions(-)
diff --git a/linux_os/guide/system/software/sudo/sudo_restrict_privilege_elevation_to_authorized/tests/simple.fail.sh b/linux_os/guide/system/software/sudo/sudo_restrict_privilege_elevation_to_authorized/tests/simple.fail.sh
index bc1f7aaf5a5..74aa21c68c8 100644
--- a/linux_os/guide/system/software/sudo/sudo_restrict_privilege_elevation_to_authorized/tests/simple.fail.sh
+++ b/linux_os/guide/system/software/sudo/sudo_restrict_privilege_elevation_to_authorized/tests/simple.fail.sh
@@ -1,3 +1,4 @@
+#!/bin/bash
# platform = SUSE Linux Enterprise 15
# packages = sudo
diff --git a/linux_os/guide/system/software/sudo/sudo_restrict_privilege_elevation_to_authorized/tests/simple.pass.sh b/linux_os/guide/system/software/sudo/sudo_restrict_privilege_elevation_to_authorized/tests/simple.pass.sh
index 9d38ecc7f92..50f6eb51dee 100644
--- a/linux_os/guide/system/software/sudo/sudo_restrict_privilege_elevation_to_authorized/tests/simple.pass.sh
+++ b/linux_os/guide/system/software/sudo/sudo_restrict_privilege_elevation_to_authorized/tests/simple.pass.sh
@@ -1,4 +1,4 @@
-# platform = SUSE Linux Enterprise 15
+#!/bin/bash
# packages = sudo
echo 'user ALL=(admin) ALL' > /etc/sudoers
diff --git a/linux_os/guide/system/software/sudo/sudo_restrict_privilege_elevation_to_authorized/tests/sudoers_d.fail.sh b/linux_os/guide/system/software/sudo/sudo_restrict_privilege_elevation_to_authorized/tests/sudoers_d.fail.sh
index f5f156829b8..4471436cada 100644
--- a/linux_os/guide/system/software/sudo/sudo_restrict_privilege_elevation_to_authorized/tests/sudoers_d.fail.sh
+++ b/linux_os/guide/system/software/sudo/sudo_restrict_privilege_elevation_to_authorized/tests/sudoers_d.fail.sh
@@ -1,4 +1,4 @@
-# platform = SUSE Linux Enterprise 15
+#!/bin/bash
# packages = sudo
# remediation = none
From 32de49c5dafdd1e8c1bb6e70b99b72ae10574060 Mon Sep 17 00:00:00 2001
From: Vojtech Polasek <vpolasek@redhat.com>
Date: Tue, 20 Apr 2021 11:57:00 +0200
Subject: [PATCH 05/10] update rule also for rhel8
---
linux_os/guide/system/software/sudo/sudo_restrict_privilege_elevation_to_authorized/rule.yml | 6 +++++-
shared/references/cce-redhat-avail.txt | 1 -
2 files changed, 5 insertions(+), 2 deletions(-)
diff --git a/linux_os/guide/system/software/sudo/sudo_restrict_privilege_elevation_to_authorized/rule.yml b/linux_os/guide/system/software/sudo/sudo_restrict_privilege_elevation_to_authorized/rule.yml
index 73812cccd83..aea61df80d2 100644
--- a/linux_os/guide/system/software/sudo/sudo_restrict_privilege_elevation_to_authorized/rule.yml
+++ b/linux_os/guide/system/software/sudo/sudo_restrict_privilege_elevation_to_authorized/rule.yml
@@ -2,7 +2,7 @@ documentation_complete: true
title: 'The operating system must restrict privilege elevation to authorized personnel'
-prodtype: ol7,rhel7,sle15
+prodtype: ol7,ol8,rhel7,rhel8,sle15
description: |-
The sudo command allows a user to execute programs with elevated
@@ -22,6 +22,8 @@ severity: medium
identifiers:
cce@sle15: CCE-85712-8
cce@rhel7: CCE-83423-4
+ cce@rhel8: CCE-83425-9
+
references:
nist: CM-6(b),CM-6(iv)
@@ -30,6 +32,8 @@ references:
disa@rhel7: CCI-000366
stigid@rhel7: RHEL-07-010341
srg: SRG-OS-000480-GPOS-00227
+ disa@rhel8: CCI-000366
+ stigid@rhel8: RHEL-08-010382
ocil_clause: '/etc/sudoers file does not restrict sudo access to authorized personnel'
diff --git a/shared/references/cce-redhat-avail.txt b/shared/references/cce-redhat-avail.txt
index 257b07d1f0b..ec8e90215f4 100644
--- a/shared/references/cce-redhat-avail.txt
+++ b/shared/references/cce-redhat-avail.txt
@@ -6,7 +6,6 @@
CCE-83407-7
CCE-83421-8
CCE-83422-6
-CCE-83425-9
CCE-83426-7
CCE-83428-3
CCE-83429-1
From 8505b5e209281f13c00581904ccc6410c76b3333 Mon Sep 17 00:00:00 2001
From: Vojtech Polasek <vpolasek@redhat.com>
Date: Tue, 20 Apr 2021 12:13:01 +0200
Subject: [PATCH 07/10] update one more test applicability
---
linux_os/guide/system/software/sudo/sudo_restrict_privilege_elevation_to_authorized/tests/simple.fail.sh | 1 -
1 file changed, 1 deletion(-)
diff --git a/linux_os/guide/system/software/sudo/sudo_restrict_privilege_elevation_to_authorized/tests/simple.fail.sh b/linux_os/guide/system/software/sudo/sudo_restrict_privilege_elevation_to_authorized/tests/simple.fail.sh
index 74aa21c68c8..8547be4d6f6 100644
--- a/linux_os/guide/system/software/sudo/sudo_restrict_privilege_elevation_to_authorized/tests/simple.fail.sh
+++ b/linux_os/guide/system/software/sudo/sudo_restrict_privilege_elevation_to_authorized/tests/simple.fail.sh
@@ -1,5 +1,4 @@
#!/bin/bash
-# platform = SUSE Linux Enterprise 15
# packages = sudo
echo 'ALL ALL=(ALL) ALL' > /etc/sudoers