APPL-15-000190 - The macOS system must configure sudo to log events.

Information

Sudo must be configured to log privilege escalation.

Without logging privilege escalation, it is difficult to identify attempted attacks because no audit trail is available for forensic investigation.

Solution

Configure the macOS system to log privilege escalation with the following command:

/usr/bin/find /etc/sudoers* -type f -exec sed -i '' '/Defaults !log_allowed/d' '{}' ;
/bin/echo 'Defaults log_allowed' >> /etc/sudoers.d/mscp

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Apple_macOS_15_V1R1_STIG.zip

Item Details

Category: AUDIT AND ACCOUNTABILITY

References: 800-53|AU-12c., CAT|II, CCI|CCI-000172, Rule-ID|SV-268451r1034293_rule, STIG-ID|APPL-15-000190, Vuln-ID|V-268451

Plugin: Unix

Control ID: 8023f013c1e8ee9a6ed46f3bdac731c919a5315eca8017d558b6d0ddbaab5a3b