added improvement to 5.2.4
Signed-off-by: Mark Bolwell <mark.bollyuk@gmail.com>
This commit is contained in:
parent
07c2ef5427
commit
717d64851c
|
@ -899,6 +899,13 @@ ubtu24cis_sudo_package: "sudo"
|
||||||
## Control 5.2.3
|
## Control 5.2.3
|
||||||
# This variable defines the path and file name of the sudo log file.
|
# This variable defines the path and file name of the sudo log file.
|
||||||
ubtu24cis_sudo_logfile: "/var/log/sudo.log"
|
ubtu24cis_sudo_logfile: "/var/log/sudo.log"
|
||||||
|
|
||||||
|
## control 5.2.4 sudoers NOPASSWD
|
||||||
|
# This will leave NOPASSWD intact for these users
|
||||||
|
ubtu24cis_sudoers_exclude_nopasswd_list:
|
||||||
|
- ec2-user
|
||||||
|
- vagrant
|
||||||
|
|
||||||
## Control 5.2.6
|
## Control 5.2.6
|
||||||
# This variable sets the duration (in minutes) during which a user's authentication credentials
|
# This variable sets the duration (in minutes) during which a user's authentication credentials
|
||||||
# are cached after successfully authenticating using "sudo". This allows the user to execute
|
# are cached after successfully authenticating using "sudo". This allows the user to execute
|
||||||
|
|
|
@ -57,12 +57,22 @@
|
||||||
- sudo
|
- sudo
|
||||||
- rule_5.2.4
|
- rule_5.2.4
|
||||||
- NIST800-53R5_AC-6
|
- NIST800-53R5_AC-6
|
||||||
ansible.builtin.replace:
|
block:
|
||||||
path: "{{ item }}"
|
- name: "5.2.4 | AUDIT | Ensure users must provide password for escalation | discover accts with NOPASSWD"
|
||||||
regexp: '^([^#|{% if system_is_ec2 %}ec2-user{% endif %}].*)NOPASSWD(.*)'
|
ansible.builtin.shell: grep -Ei '(nopasswd)' /etc/sudoers /etc/sudoers.d/* | cut -d':' -f1
|
||||||
replace: '\1PASSWD\2'
|
become: true
|
||||||
validate: '/usr/sbin/visudo -cf %s'
|
changed_when: false
|
||||||
loop: "{{ prelim_sudoers_files.stdout_lines }}"
|
failed_when: false
|
||||||
|
register: discovered_sudoers_nopasswd
|
||||||
|
|
||||||
|
- name: "5.2.4 | PATCH | Ensure users must provide password for escalation"
|
||||||
|
when: discovered_sudoers_nopasswd.stdout | length > 0
|
||||||
|
ansible.builtin.replace:
|
||||||
|
path: "{{ item }}"
|
||||||
|
regexp: '^((?!#|{% for name in ubtu24cis_sudoers_exclude_nopasswd_list %}{{ name }}{% if not loop.last -%}|{%- endif -%}{% endfor %}).*)NOPASSWD(.*)'
|
||||||
|
replace: '\1PASSWD\2'
|
||||||
|
validate: '/usr/sbin/visudo -cf %s'
|
||||||
|
loop: "{{ discovered_sudoers_nopasswd.stdout_lines }}"
|
||||||
|
|
||||||
- name: "5.2.5 | PATCH | Ensure re-authentication for privilege escalation is not disabled globally"
|
- name: "5.2.5 | PATCH | Ensure re-authentication for privilege escalation is not disabled globally"
|
||||||
when:
|
when:
|
||||||
|
|
Loading…
Reference in New Issue