AOSX-14-002064 - The macOS system must have the security assessment policy subsystem enabled.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Any changes to the hardware, software, and/or firmware components of the information system and/or application can potentially have significant effects on the overall security of the system.

Accordingly, software defined by the organization as critical must be signed with a certificate that is recognized and approved by the organization.

Solution

To enable the Security assessment policy subsystem, run the following command:

/usr/bin/sudo /usr/sbin/spctl --master-enable

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Apple_OS_X_10-14_V2R4_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-5(3), CAT|I, CCI|CCI-001749, Rule-ID|SV-209606r610285_rule, STIG-ID|AOSX-14-002064, STIG-Legacy|SV-105089, STIG-Legacy|V-95951, Vuln-ID|V-209606

Plugin: Unix

Control ID: e5097bb4c5d0b51a99d8ef733e83664ba7eec6fab8014911bfa1fcf4911d2fe4