While programs allowing users to gain administrative privileges are a potential security risk, security itself is beyond the scope of this particular book. You should therefore refer to the resources listed below for more information regarding security and privileged access.
su(1) — The manual page for
su provides information regarding the options available with this command.
sudo(8) — The manual page for
sudo includes a detailed description of this command and lists options available for customizing its behavior.
pam(8) — The manual page describing the use of Pluggable Authentication Modules (PAM) for Linux.
Red Hat Enterprise Linux 7 Security Guide
— The Security Guide
for Red Hat Enterprise Linux 7 provides a more detailed look at potential security issues pertaining to the
programs as well as techniques used to alleviate these risks.