Sudoers policy file modified

이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Goal

Detect modifications to /etc/sudoers policy file.

Strategy

Sudo allows users to perform commands from terminals with delegated authority to give certain users (or groups of users) the ability to run some (or all) commands as root. The sudoers policy file, /etc/sudoers, describes which users can run commands with root level privileges using sudo. Adversaries may attempt to edit the sudoers policy file to execute commands as other users or to spawn processes with higher privileges.

Triage and response

  1. Identify if the changes to the path {{@file.path}} were part of known system setup or maintenance.
  2. If these changes were unauthorized, roll back the host in question to a known good sudoers policy file, or replace the system with a known good system image.

Requires Agent version 7.27 or greater.

PREVIEWING: dgreen15/github-error-fix