STIGhubSTIGhub
STIGsSearchCompareAbout

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • VPAT
  • DISA STIG Library
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Anduril NixOS Security Technical Implementation Guide

V-268155

CAT II (Medium)

NixOS must require users to reauthenticate for privilege escalation.

Rule ID

SV-268155r1131113_rule

STIG

Anduril NixOS Security Technical Implementation Guide

Version

V1R2

CCIs

CCI-000366

Discussion

Without reauthentication, users may access resources or perform tasks for which they do not have authorization. When operating systems provide the capability to escalate a functional capability, it is critical the user reauthenticate.

Check Content

Verify NixOS enforces reauthentication with sudo with the following command:

$ sudo grep timestamp_timeout /etc/sudoers

 Defaults timestamp_timeout=0

If "timestamp_timeout" is greater than 0, is commented out, or is missing, this is a finding.

Fix Text

Configure NixOS to enforce reauthentication with sudo.

Add the following Nix code to the NixOS Configuration, usually located in /etc/nixos/configuration.nix or /etc/nixos/flake.nix:

 security.sudo.extraConfig = ''
Defaults timestamp_timeout=0
'';

Rebuild and switch to the new NixOS configuration:
$ sudo nixos-rebuild switch