File: rule.yml

package info (click to toggle)
scap-security-guide 0.1.78-1
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 114,600 kB
  • sloc: xml: 245,305; sh: 84,381; python: 33,093; makefile: 27
file content (33 lines) | stat: -rw-r--r-- 1,010 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
documentation_complete: true

title: Verify Group Who Owns /etc/sudoers File

description: '{{{ describe_file_group_owner(file="/etc/sudoers", group="root") }}}'

rationale: |-
    The ownership of the /etc/sudoers file by the root group is important
    because this file hosts sudo configuration. Protection of this
    file is critical for system security. Assigning the ownership to root
    ensures exclusive control of the sudo configuration.

severity: medium

identifiers:
    cce@rhel8: CCE-86413-2
    cce@rhel9: CCE-86414-0
    cce@rhel10: CCE-89613-4

ocil_clause: '{{{ ocil_clause_file_group_owner(file="/etc/sudoers", group="root") }}}'

ocil: |-
    {{{ ocil_file_group_owner(file="/etc/sudoers", group="root") }}}

fixtext: '{{{ fixtext_file_group_owner(file="/etc/sudoers", group="root") }}}'

srg_requirement: '{{{ srg_requirement_file_group_owner(file="/etc/sudoers", group="root") }}}'

template:
    name: file_groupowner
    vars:
        filepath: /etc/sudoers
        gid_or_name: root