Chapter 8: RHEL OS security hardening


What options do I have for RHEL sudoer configuration?