Verify Sudoers Policy File Modifications
이 페이지는 아직 한국어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우
언제든지 연락주시기 바랍니다.Security recommendation
| Impact | Remediation complexity | Severity | Recommended value |
|---|
| 3 | 2 | 2 | No unauthorized modifications |
Sudoers policy files should be protected from unauthorized modifications to maintain proper privilege escalation controls and prevent security bypasses.
Compliance
Documentation
The sudoers policy file (/etc/sudoers and files in /etc/sudoers.d/) controls which users can execute commands with elevated privileges using the sudo command. This file is critical for maintaining proper access controls and preventing unauthorized privilege escalation.
File Integrity Monitoring (FIM) detects various types of modifications to sudoers policy files, including:
- chmod: Permission changes that could make the file writable by unauthorized users
- chown: Ownership changes that could transfer control to malicious actors
- link/rename: File system operations that could replace legitimate policies
- open: Write operations that modify policy content
- unlink: Deletion attempts that could remove security controls
- utimes: Timestamp modifications that could hide evidence of tampering
Prerequisites
You must have
root privileges to modify sudoers policy files- Access to system logs to investigate unauthorized changes
- Backup of known-good sudoers configuration
- Agent v7.27 or newer for File Integrity monitoring
Step-by-step guide
Step 1: Investigate the modification
Review system logs to identify what changes were made and by whom:
# Check recent sudoers modifications
sudo find /etc -name "sudoers*" -exec ls -la {} \;
# Review audit logs for sudoers changes
sudo ausearch -f /etc/sudoers -ts recent
# Check system logs for related activity
sudo journalctl -u sudo -n 50
Step 2: Validate current sudoers configuration
Check the current sudoers configuration for unauthorized entries:
# Validate sudoers syntax
sudo visudo -c
# Review current sudoers content
sudo cat /etc/sudoers
sudo ls -la /etc/sudoers.d/