AOSX-13-000430 - The macOS system must have the security assessment policy subsystem enabled.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Any changes to the hardware, software, and/or firmware components of the information system and/or application can potentially have significant effects on the overall security of the system.

Accordingly, software defined by the organization as critical must be signed with a certificate that is recognized and approved by the organization.

Solution

To enable the Security assessment policy subsystem, run the following command:

/usr/bin/sudo /usr/sbin/spctl --master-enable

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Apple_OS_X_10-13_V2R1_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-7(4), CAT|I, CCI|CCI-001749, Rule-ID|SV-214847r507075_rule, STIG-ID|AOSX-13-000430, STIG-Legacy|SV-96269, STIG-Legacy|V-81555, Vuln-ID|V-214847

Plugin: Unix

Control ID: 4788ae08b85172c63852bea117f0e9e2267e81ae672f8bb70be842a2f66f845b