File: rule.yml

package info (click to toggle)
scap-security-guide 0.1.78-1
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 114,600 kB
  • sloc: xml: 245,305; sh: 84,381; python: 33,093; makefile: 27
file content (33 lines) | stat: -rw-r--r-- 972 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
documentation_complete: true

title: Verify User Who Owns /etc/sudoers File

description: '{{{ describe_file_owner(file="/etc/sudoers", owner="root") }}}'

rationale: |-
    The ownership of the /etc/sudoers file by the root user is important
    because this file hosts sudo configuration. Protection of this
    file is critical for system security. Assigning the ownership to root
    ensures exclusive control of the sudo configuration.

severity: medium

identifiers:
    cce@rhel8: CCE-86416-5
    cce@rhel9: CCE-86417-3
    cce@rhel10: CCE-87065-9

ocil_clause: '{{{ ocil_clause_file_owner(file="/etc/sudoers", owner="root") }}}'

ocil: |-
    {{{ ocil_file_owner(file="/etc/sudoers", owner="root") }}}

fixtext: '{{{ fixtext_file_owner(file="/etc/sudoers", owner="root") }}}'

srg_requirement: '{{{ srg_requirement_file_owner(file="/etc/sudoers", owner="root") }}}'

template:
    name: file_owner
    vars:
        filepath: /etc/sudoers
        uid_or_name: '0'