APPL-14-001023 - The macOS system must be configured to audit all failed write actions on the system.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

The audit system must be configured to record enforcement actions of access restrictions, including failed file write (-fw) attempts.

Enforcement actions are the methods or mechanisms used to prevent unauthorized access and/or changes to configuration settings. One common and effective enforcement action method is using access restrictions (e.g., denying users access to edit a file by applying file permissions).

This configuration ensures that audit lists include events in which enforcement actions prevent attempts to change a file.

Without auditing the enforcement of access restrictions, it is difficult to identify attempted attacks, as there is no audit trail available for forensic investigation.

Satisfies: SRG-OS-000463-GPOS-00207,SRG-OS-000057-GPOS-00027,SRG-OS-000465-GPOS-00209,SRG-OS-000466-GPOS-00210,SRG-OS-000467-GPOS-00211,SRG-OS-000468-GPOS-00212

Solution

Configure the macOS system to audit all failed write actions on the system with the following command:

/usr/bin/grep -qE '^flags.*-fw' /etc/security/audit_control || /usr/bin/sed -i.bak '/^flags/ s/$/,-fw/' /etc/security/audit_control;/usr/sbin/audit -s

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Apple_macOS_14_V2R1_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000162, CCI|CCI-000172, Rule-ID|SV-259465r991573_rule, STIG-ID|APPL-14-001023, Vuln-ID|V-259465

Plugin: Unix

Control ID: 628791178eb61abe0aa50a104c1bc689fdafcecea2a7b6e7102a416fdec9a4e3