1.46 APPL-14-001024

Information

The macOS system must be configured to audit all failed program execution on the system.

GROUP ID: V-259466RULE ID: SV-259466r1009587

The audit system must be configured to record enforcement actions of access restrictions, including failed program execute (-ex) attempts.

Enforcement actions are the methods or mechanisms used to prevent unauthorized access and/or changes to configuration settings. One common and effective enforcement action method is using program execution restrictions (e.g., denying users access to execute certain processes).

This configuration ensures that audit lists include events in which program execution has failed.

Without auditing the enforcement of program execution, it is difficult to identify attempted attacks as there is no audit trail available for forensic investigation.

Satisfies: SRG-OS-000463-GPOS-00207,SRG-OS-000365-GPOS-00152,SRG-OS-000458-GPOS-00203,SRG-OS-000465-GPOS-00209

Solution

Configure the macOS system to audit all failed program execution on the system with the following command:

/usr/bin/grep -qE "^flags.*-ex" /etc/security/audit_control || /usr/bin/sed -i.bak '/^flags/ s/$/,-ex/' /etc/security/audit_control; /usr/sbin/audit -s

See Also

https://workbench.cisecurity.org/benchmarks/24070

Item Details

Category: AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

References: 800-53|AU-12c., 800-53|CM-5(1), CAT|II, CCI|CCI-000172, CCI|CCI-001814, CCI|CCI-003938, Rule-ID|SV-259466r1009587_rule, STIG-ID|APPL-14-001024, Vuln-ID|V-259466

Plugin: Unix

Control ID: 8d9c30868af082fa9a6f0fbc962469fe660e4a795cc0f11ebf683a8fe91e0df4