AOSX-11-000435 - The operating system must limit privileges to change software resident within software libraries.

Information

File permissions should be compared against the default set of permissions that were set at the time of the initial install. Changes to default file permissions can make the system less secure and disrupt the functionality of installed applications. Unless changes are required to harden a system, the default permissions should be kept. If the operating system were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that are part of a robust change management process. Verifying that permissions remain unchanged mitigates this risk.

This requirement applies to operating systems with software libraries that are accessible and configurable, as in the case of interpreted languages. Software libraries also include privileged programs which execute with escalated privileges. Only qualified and authorized individuals shall be allowed to obtain access to information system components for purposes of initiating changes, including upgrades and modifications.false

Solution

To re-enable "System Integrity Protection", boot the affected system into "Recovery" Mode, launch "Terminal" from the "Utilities" menu, and run the following command:

/usr/bin/csrutil enable

See Also

https://iasecontent.disa.mil/stigs/zip/U_Apple_OS_X_10-11_V1R6_STIG.zip

Item Details

Category: SYSTEM AND INFORMATION INTEGRITY

References: 800-53|SI-7(1), CAT|II, CCI|CCI-001499, Rule-ID|SV-82051r1_rule, STIG-ID|AOSX-11-000435, Vuln-ID|V-67561

Plugin: Unix

Control ID: 91fe882306a0f50d67b9ee3fc9e35ba40501b3c8683fc9d183c00f9758f8d74a