[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CCE
view XML

CCE-92673-3

Platform: cpe:/o:ubuntu:ubuntu_linux:18.04Date: (C)2019-11-07   (M)2023-07-14



Monitor scope changes for system administrations. If the system has been properly configured to force system administrators to log in as themselves first and then use the sudo command to execute privileged commands, it is possible to monitor changes in scope. The file /etc/sudoers will be written to when the file or its attributes have changed. The audit records will be tagged with the identifier scope. Rationale: Changes in the /etc/sudoers file can indicate that an unauthorized change has been made to scope of system administrator activity.


Parameter:

[yes/no]


Technical Mechanism:

Add the following lines to the /etc/audit/audit.rules file. -w /etc/sudoers -p wa -k scope # Execute the following command to restart auditd # pkill -HUP -P 1 auditd

CCSS Severity:CCSS Metrics:
CCSS Score : 5.7Attack Vector: LOCAL
Exploit Score: 1.5Attack Complexity: LOW
Impact Score: 3.7Privileges Required: HIGH
Severity: MEDIUMUser Interaction: NONE
Vector: AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:LScope: CHANGED
 Confidentiality: LOW
 Integrity: LOW
 Availability: LOW
  

References:
Resource IdReference
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:51272


OVAL    1
oval:org.secpod.oval:def:51272
XCCDF    1
xccdf_org.secpod_benchmark_general_Ubuntu_18_04

© SecPod Technologies