heroui logo

Linux Auditd Nopasswd Entry In Sudoers File

Splunk Security Content

View Source
Summary
This detection rule targets the addition of NOPASSWD entries in the /etc/sudoers file on Linux systems by utilizing Linux Auditd data. The inclusion of NOPASSWD in entries allows certain users to execute commands with elevated privileges without the need for password authentication, which raises security concerns; if such modifications are utilized by malicious actors, it can lead to unauthorized access and potential compromise of sensitive systems. The detection rule searches for particular command lines in the audit logs and triggers alerts if such an entry is identified. Proper implementation requires ingesting and normalizing auditd data to use the Splunk platform effectively, emphasizing the importance of these logs in monitoring Linux endpoints for anomalous or unauthorized activities.
Categories
  • Linux
  • Endpoint
Data Sources
  • Pod
  • File
  • Logon Session
ATT&CK Techniques
  • T1548.003
  • T1548
Created: 2025-01-27