Verify Non-Root Password Modifications on Host
このページは日本語には対応しておりません。随時翻訳に取り組んでいます。
翻訳に関してご質問やご意見ございましたら、
お気軽にご連絡ください。
Security recommendation
| Impact | Remediation complexity | Severity | Recommended value |
|---|
| 3 | 2 | 3 | Monitor and investigate all password changes |
User account password modifications should be monitored and investigated to detect unauthorized access attempts, privilege escalation, and account compromise. All password changes on host systems should be reviewed to ensure they are authorized and legitimate.
Compliance
Documentation
The passwd command is used to change user account passwords on Linux systems. While legitimate password changes are a normal part of system administration, unauthorized or unexpected password modifications should be audited based on organizational policies.
Prerequisites
You must have:
root or sudo privileges to investigate password changes- Access to system audit logs and authentication logs
- Knowledge of authorized password change procedures in your environment
- Agent v7.27 or newer for Workload Security monitoring
Step-by-step guide
Step 1: Investigate the password change
Identify who changed the password, when, and from where:
# Check authentication logs for passwd command execution
sudo grep "passwd" /var/log/auth.log | tail -20
# Review audit logs for password changes
sudo ausearch -c passwd -ts recent
# Check for recent password changes in shadow file
sudo ls -la /etc/shadow
# Review command history for the user who executed passwd
sudo cat /home/[username]/.bash_history | grep passwd
# Check active sessions and login history
who
last -20
Step 2: Verify authorization
Determine if the password change was authorized:
- Check if the change was made by the account owner or administrator
- Review change management tickets or approval records
- Contact the user or administrator who made the change
- Check if the change aligns with scheduled maintenance or rotation policies