3.4 sudo Configuration and Privilege Escalation
Content
- Overview and Objectives
- Understanding sudo’s Purpose and Security Model
- The sudoers File Structure and Syntax
- Using visudo for Safe Configuration
- User and Group-Based sudo Rules
- Command Restrictions and Environment Control
- sudo Logging and Security Monitoring
- Common Pitfalls and Security Best Practices
- sudo alternatives
- Recommended Reading
- Lab Exercises
- Assessment
This chapter is available exclusively to members of The Server Room, my DevOps community of practice. You have multiple options for taking this course, for example self-guided or instructor-led. Check out the course details to learn more!