Ensure Users Re-Authenticate for Privilege Escalation - sudo !authenticate
Ensure Users Re-Authenticate for Privilege Escalation - sudo NOPASSWD
Ensure Users Re-Authenticate for Privilege Escalation - sudo
Disallow Configuration to Bypass Password Requirements for Privilege Escalation
Require Re-Authentication When Using the sudo Command
The ALG providing user authentication intermediary services must require users to re-authenticate when organization-defined circumstances or situations require re-authentication.
The application server must require users to re-authenticate when organization-defined circumstances or situations require re-authentication.
The application must require users to reauthenticate when organization-defined circumstances or situations require reauthentication.
The CA API Gateway providing user authentication intermediary services must require users to reauthenticate when organization-defined circumstances or situations require reauthentication.
The Central Log Server must require users to reauthenticate when organization-defined circumstances or situations require reauthentication.
The Lifetime Minutes and Renewal Threshold Minutes Login Session Controls must be set to 10 and 0 respectively in Docker Enterprise.
CounterACT, when providing user authentication intermediary services, must require users to reauthenticate when organization-defined circumstances or situations require reauthentication.
The DataPower Gateway must require users to re-authenticate when privilege escalation or role changes occur.
HTTP session timeout must be configured.
The Mainframe Product must require users to reauthenticate when circumstances or situations require reauthentication as defined in site security plan.
Nutanix AOS must require users to reauthenticate for privilege escalation.
Prisma Cloud Compute local accounts must enforce strong password requirements.
Splunk Enterprise idle session timeout must be set to not exceed 15 minutes.
Symantec ProxySG providing user authentication intermediary services must require users to reauthenticate every 900 seconds when organization-defined circumstances or situations require reauthentication.
The UEM server must require users (administrators) to reauthenticate when roles change.
The IPsec VPN Gateway must renegotiate the security association after 8 hours or less, or an organization-defined period.
The VPN Gateway must renegotiate the security association after 24 hours or less or as defined by the organization.
Idle timeout for management application must be set to 10 minutes.
The macOS system must require users to reauthenticate for privilege escalation when using the "sudo" command.
The macOS system must configure sudoers timestamp type.
The Ubuntu operating system must require users to re-authenticate for privilege escalation and changing roles.
The Ubuntu operating system must require users to reauthenticate for privilege escalation or when changing roles.
PostgreSQL must require users to reauthenticate when organization-defined circumstances or situations require reauthentication.
The Cisco ASA VPN gateway must be configured to renegotiate the IPsec Security Association after eight hours or less.
The Cisco ASA VPN gateway must be configured to renegotiate the IKE security association after 24 hours or less.
The container platform must require users to reauthenticate when organization-defined circumstances or situations require reauthentication.
The EDB Postgres Advanced Server must require users to reauthenticate when organization-defined circumstances or situations require reauthentication.
The DBMS must require users to re-authenticate when organization-defined circumstances or situations require re-authentication.
The operating system must require users to re-authenticate for privilege escalation.
The operating system must require users to re-authenticate when changing roles.
The operating system must require users to re-authenticate when changing authenticators.
SSMC must prevent nonprivileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
AIX must remove NOPASSWD tag from sudo config files.
AIX must remove !authenticate option from sudo config files.
If GSSAPI authentication is not required on AIX, the SSH daemon must disable GSSAPI authentication.
MariaDB must require users to reauthenticate when organization-defined circumstances or situations require reauthentication.
MongoDB must require users to reauthenticate when organization-defined circumstances or situations require reauthentication.
Users must be prompted for a password on resume from sleep (on battery).
The user must be prompted for a password on resume from sleep (plugged in).
Passwords must not be saved in the Remote Desktop Client.
Remote Desktop Services must always prompt a client for passwords upon connection.
The Windows Remote Management (WinRM) service must not store RunAs credentials.
User Account Control approval mode for the built-in Administrator must be enabled.
User Account Control must automatically deny elevation requests for standard users.
User Account Control must run all administrators in Admin Approval Mode, enabling UAC.
User Account Control must automatically deny standard user requests for elevation.
Windows Server 2019 must not save passwords in the Remote Desktop Client.
Windows Server 2019 Remote Desktop Services must always prompt a client for passwords upon connection.
Windows Server 2019 Windows Remote Management (WinRM) service must not store RunAs credentials.
Windows Server 2019 User Account Control approval mode for the built-in Administrator must be enabled.
Windows Server 2019 User Account Control must automatically deny standard user requests for elevation.
Windows Server 2019 User Account Control must run all administrators in Admin Approval Mode, enabling UAC.
Windows Server 2022 must not save passwords in the Remote Desktop Client.
Windows Server 2022 Remote Desktop Services must always prompt a client for passwords upon connection.
Windows Server 2022 Windows Remote Management (WinRM) service must not store RunAs credentials.
Windows Server 2022 User Account Control (UAC) approval mode for the built-in Administrator must be enabled.
Windows Server 2022 User Account Control (UAC) must automatically deny standard user requests for elevation.
Windows Server 2022 User Account Control (UAC) must run all administrators in Admin Approval Mode, enabling UAC.
The Oracle Linux operating system must be configured so that users must provide a password for privilege escalation.
The Oracle Linux operating system must be configured so users must re-authenticate for privilege escalation.
The Oracle Linux operating system must require re-authentication when using the "sudo" command.
The Oracle Linux operating system must not be configured to bypass password requirements for privilege escalation.
OL 8 must require users to provide a password for privilege escalation.
OL 8 must require users to reauthenticate for privilege escalation and changing roles.
OL 8 must require re-authentication when using the "sudo" command.
The OL 8 operating system must not be configured to bypass password requirements for privilege escalation.
The MySQL Database Server 8.0 must require users to reauthenticate when organization-defined circumstances or situations require reauthentication.
Automation Controller must be configured to use an enterprise user management system.
Redis Enterprise DBMS must require users to reauthenticate when organization-defined circumstances or situations require reauthentication.
OpenShift must terminate all network connections associated with a communications session at the end of the session, or as follows: for in-band management sessions (privileged sessions), the session must be terminated after 10 minutes of inactivity.
RHEL 8 must require users to provide a password for privilege escalation.
RHEL 8 must require users to reauthenticate for privilege escalation.
The Red Hat Enterprise Linux operating system must be configured so that users must provide a password for privilege escalation.
The Red Hat Enterprise Linux operating system must be configured so that users must re-authenticate for privilege escalation.
The Red Hat Enterprise Linux operating system must require re-authentication when using the "sudo" command.
The Red Hat Enterprise Linux operating system must not be configured to bypass password requirements for privilege escalation.
The SUSE operating system must reauthenticate users when changing authenticators, roles, or escalating privileges.
RHEL 8 must require re-authentication when using the "sudo" command.
The RHEL 8 operating system must not be configured to bypass password requirements for privilege escalation.
The SUSE operating system must require re-authentication when using the "sudo" command.
The SUSE operating system must not be configured to bypass password requirements for privilege escalation.
RHEL 9 must require reauthentication when using the "sudo" command.
RHEL 9 must require users to reauthenticate for privilege escalation.
RHEL 9 must restrict the use of the "su" command.
RHEL 9 must require users to provide a password for privilege escalation.
RHEL 9 must not be configured to bypass password requirements for privilege escalation.
Splunk Enterprise idle session timeout must be set to not exceed 15 minutes.
The VMM must require users to re-authenticate for privilege escalation.
The VMM must require users to re-authenticate when changing roles.
The VMM must require users to re-authenticate when changing authenticators.
The Photon operating system must require users to reauthenticate for privilege escalation.
The vCenter Server must terminate vSphere Client sessions after 15 minutes of inactivity.
The vCenter Server must terminate vSphere Client sessions after 10 minutes of inactivity.
The vCenter ESX Agent Manager service must set an inactive timeout for sessions.
The vCenter Lookup service must set an inactive timeout for sessions.
The vCenter Perfcharts service must set an inactive timeout for sessions.
The vCenter STS service must set an inactive timeout for sessions.
The vCenter UI service must set an inactive timeout for sessions.
The EDB Postgres Advanced Server must require users to re-authenticate when organization-defined circumstances or situations require re-authentication.
The BIG-IP APM module must require users to reauthenticate when the user's role or information authorizations are changed.
The F5 BIG-IP appliance must be configured to set a "Maximum Session Timeout" value of 8 hours or less.
The BIG-IP Core implementation must require users to reauthenticate when the user's role, the information authorizations, and/or the maximum session timeout is exceeded for the virtual server(s).
Idle timeout for the management application must be set to 10 minutes.
The application must require devices to reauthenticate when organization-defined circumstances or situations requiring reauthentication.
Ubuntu 22.04 LTS must require users to reauthenticate for privilege escalation or when changing roles.
Dragos must configure idle timeouts at 10 minutes.
The F5 BIG-IP appliance providing user authentication intermediary services must require users to reauthenticate when the user's role or information authorizations is changed.
The F5 BIG-IP appliance must be configured to set a Maximum Session Timeout value of eight hours or less.
The F5 BIG-IP appliance IPsec VPN Gateway must renegotiate the IPsec Phase 1 security association after eight hours or less.
The F5 BIG-IP appliance IPsec VPN must renegotiate the IKE Phase 2 security association after eight hours or less.
The Lifetime Minutes and Renewal Threshold Minutes Login Session Controls on MKE must be set.
OL 8 must require reauthentication when using the "sudo" command.
SLEM 5 must reauthenticate users when changing authenticators, roles, or escalating privileges.
SLEM 5 must require reauthentication when using the "sudo" command.
The SUSE operating system must require reauthentication when using the "sudo" command.
Splunk Enterprise idle session timeout must be set to not exceed 15 minutes.