Information
System Integrity Protection (SIP) is vital to the protection of the integrity of macOS. SIP restricts what actions can be performed by administrative users, including root, against protected parts of the operating system. SIP protects all system binaries, including audit tools, from unauthorized access by preventing the modification or deletion of system binaries, or the changing of the permissions associated with those binaries. SIP limits the privileges to change software resident within software libraries to processes that have signed by Apple and have special entitlements to write to system files, such as Apple software updates and Apple installers. By protecting audit binaries, SIP ensures the presence of an audit record generation capability for DoD-defined auditable events for all operating system components and supports on-demand and after-the-fact reporting requirements.
Satisfies: SRG-OS-000051-GPOS-00024, SRG-OS-000054-GPOS-00025, SRG-OS-000062-GPOS-00031, SRG-OS-000122-GPOS-00063, SRG-OS-000256-GPOS-00097, SRG-OS-000257-GPOS-00098, SRG-OS-000258-GPOS-00099, SRG-OS-000259-GPOS-00100, SRG-OS-000348-GPOS-00136, SRG-OS-000349-GPOS-00137, SRG-OS-000350-GPOS-00138, SRG-OS-000351-GPOS-00139, SRG-OS-000352-GPOS-00140, SRG-OS-000353-GPOS-00141, SRG-OS-000354-GPOS-00142
Solution
To reenable 'System Integrity Protection', boot the affected system into 'Recovery' mode, launch 'Terminal' from the 'Utilities' menu, and run the following command:
/usr/bin/csrutil enable
Item Details
Category: AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT
References: 800-53|AU-6(4), 800-53|AU-7(1), 800-53|AU-7a., 800-53|AU-7b., 800-53|AU-9, 800-53|AU-12a., 800-53|CM-5(6), CAT|II, CCI|CCI-000154, CCI|CCI-000158, CCI|CCI-000169, CCI|CCI-001493, CCI|CCI-001494, CCI|CCI-001495, CCI|CCI-001499, CCI|CCI-001875, CCI|CCI-001876, CCI|CCI-001877, CCI|CCI-001878, CCI|CCI-001879, CCI|CCI-001880, CCI|CCI-001881, CCI|CCI-001882, Rule-ID|SV-209635r610285_rule, STIG-ID|AOSX-14-005001, STIG-Legacy|SV-105133, STIG-Legacy|V-95995, Vuln-ID|V-209635
Control ID: 3e6189fb4f3eb8fdfaf902bc3829ee51153895a3c5aed4349d07e5bca40bea20