APPL-15-000190 - The macOS system must configure sudo to log events.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Sudo must be configured to log privilege escalation.

Without logging privilege escalation, it is difficult to identify attempted attacks because no audit trail is available for forensic investigation.

Solution

Configure the macOS system to log privilege escalation with the following command:

/usr/bin/find /etc/sudoers* -type f -exec sed -i '' '/Defaults !log_allowed/d' '{}' ;
/bin/echo 'Defaults log_allowed' >> /etc/sudoers.d/mscp

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Apple_macOS_15_V1R1_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000172, Rule-ID|SV-268451r1034293_rule, STIG-ID|APPL-15-000190, Vuln-ID|V-268451

Plugin: Unix

Control ID: 8023f013c1e8ee9a6ed46f3bdac731c919a5315eca8017d558b6d0ddbaab5a3b