heroui logo

Linux NOPASSWD Entry In Sudoers File

Splunk Security Content

View Source
Summary
This detection rule identifies the addition of 'NOPASSWD' entries to the /etc/sudoers file on Linux systems, leveraging Endpoint Detection and Response (EDR) telemetry. The rule triggers when command lines include 'NOPASSWD:', indicating that users can execute commands with escalated privileges without entering a password. This is critically significant as it poses a risk for privilege escalation, unauthorized access, and the potential compromise of sensitive data and system integrity. The analytic uses Sysmon for Linux logs to monitor and correlate such events across endpoints, providing an effective means to detect this potentially malicious configuration change.
Categories
  • Linux
  • Endpoint
Data Sources
  • Pod
  • Container
ATT&CK Techniques
  • T1548.003
  • T1548
Created: 2025-01-27