STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide

V-269232

CAT II (Medium)

AlmaLinux OS 9 must restrict privilege elevation to authorized personnel.

Rule ID

SV-269232r1101826_rule

STIG

Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide

Version

V1R6

CCIs

CCI-000366

Discussion

If the "sudoers" file is not configured correctly, any user defined on the system can initiate privileged actions on the target system.

Check Content

Verify AlmaLinux OS 9 restricts privilege elevation to authorized personnel with the following command:

$ sudo grep -iwR 'ALL' /etc/sudoers /etc/sudoers.d/ | grep -v '#'

/etc/sudoers:root ALL=(ALL) ALL
/etc/sudoers:%wheel ALL=(ALL) NOPASSWD: ALL

If the either of the following entries are returned, including their NOPASSWD equivalents, this is a finding:
ALL     ALL=(ALL) ALL
ALL     ALL=(ALL:ALL) ALL

Fix Text

Remove the following entries from the /etc/sudoers file or configuration files under /etc/sudoers.d/ (including NOPASSWD equivalents):

ALL     ALL=(ALL) ALL
ALL     ALL=(ALL:ALL) ALL