This is not the latest version of the STIG. This is provided for archival purposes. See the latest STIG.

Amazon Linux 2023 must not be configured to bypass password requirements for privilege escalation.

STIG ID: AZLX-23-001005  |  SRG: SRG-OS-000312-GPOS-00123 |  Severity: medium (CAT II)  |  CCI: CCI-002165 |  Vulnerability Id: V-274013

Vulnerability Discussion

Without reauthentication, users may access resources or perform tasks for which they do not have authorization. When operating systems provide the capability to escalate a functional capability, it is critical the user reauthenticate.

Check

Verify Amazon Linux 2023 is not configured to bypass password requirements for privilege escalation with the following command:

$ sudo grep pam_succeed_if /etc/pam.d/sudo

If any occurrences of "pam_succeed_if" are returned, this is a finding.

Fix

Configure Amazon Linux 2023 to require users to supply a password for privilege escalation.

Remove any occurrences of "pam_succeed_if " in the "/etc/pam.d/sudo" file.