AOSX-13-000143 - The macOS system must be configured to disable the Network File System (NFS) stat daemon unless it is required.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

If the system does not require access to NFS file shares or is not acting as an NFS server, support for NFS is non-essential and NFS services must be disabled. NFS is a network file system protocol supported by UNIX-like operating systems. Enabling any service increases the attack surface for an intruder. By disabling unnecessary services, the attack surface is minimized.

Solution

To disable the NFS stat daemon, run the following command:

/usr/bin/sudo /bin/launchctl disable system/com.apple.statd.notify

The system may need to be restarted for the update to take effect.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Apple_OS_X_10-13_V2R3_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-7, CAT|II, CCI|CCI-000381, Rule-ID|SV-214827r609363_rule, STIG-ID|AOSX-13-000143, STIG-Legacy|SV-96229, STIG-Legacy|V-81515, Vuln-ID|V-214827

Plugin: Unix

Control ID: e01d53f4ba85c9ac446998669c61dae9420d59773711e603da64f82ade032f45