Verify Non-Root Password Modifications on Host
이 페이지는 아직 한국어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우
언제든지 연락주시기 바랍니다.Security recommendation
| Impact | Remediation complexity | Severity | Recommended value |
|---|
| 3 | 2 | 3 | Monitor and investigate all password changes |
User account password modifications should be monitored and investigated to detect unauthorized access attempts, privilege escalation, and account compromise. All password changes on host systems should be reviewed to ensure they are authorized and legitimate.
Compliance
Documentation
The passwd command is used to change user account passwords on Linux systems. While legitimate password changes are a normal part of system administration, unauthorized or unexpected password modifications should be audited based on organizational policies.
Prerequisites
You must have:
root or sudo privileges to investigate password changes- Access to system audit logs and authentication logs
- Knowledge of authorized password change procedures in your environment
- Agent v7.27 or newer for Workload Security monitoring
Step-by-step guide
Step 1: Investigate the password change
Identify who changed the password, when, and from where:
# Check authentication logs for passwd command execution
sudo grep "passwd" /var/log/auth.log | tail -20
# Review audit logs for password changes
sudo ausearch -c passwd -ts recent
# Check for recent password changes in shadow file
sudo ls -la /etc/shadow
# Review command history for the user who executed passwd
sudo cat /home/[username]/.bash_history | grep passwd
# Check active sessions and login history
who
last -20
Step 2: Verify authorization
Determine if the password change was authorized:
- Check if the change was made by the account owner or administrator
- Review change management tickets or approval records
- Contact the user or administrator who made the change
- Check if the change aligns with scheduled maintenance or rotation policies