1.127 APPL-14-003051

Information

The macOS system must enforce multifactor authentication for the su command.

GROUP ID: V-259548RULE ID: SV-259548r1009601

The system must be configured such that, when the su command is used, multifactor authentication is enforced.

All users must go through multifactor authentication to prevent unauthenticated access and potential compromise to the system.

IMPORTANT: Modification of Pluggable Authentication Modules (PAM) now requires user authorization or use of a Privacy Preferences Policy Control (PPPC) profile from MDM that authorizes modifying system administrator files or full disk access.

Note: /etc/pam.d/su will be automatically modified to its original state following any update or major upgrade to the operating system.

Satisfies: SRG-OS-000105-GPOS-00052,SRG-OS-000106-GPOS-00053,SRG-OS-000107-GPOS-00054,SRG-OS-000108-GPOS-00055,SRG-OS-000112-GPOS-00057

Solution

Configure the macOS system to enforce multifactor authentication for the su command with the following commands:

/bin/cat > /etc/pam.d/su << SU_END

su: auth account password session

auth sufficient pam_smartcard.soauth required pam_rootok.soauth required pam_group.so no_warn group=admin,wheel ruser root_only fail_safeaccount required pam_permit.soaccount required pam_opendirectory.so no_check_shellpassword required pam_opendirectory.sosession required pam_launchd.soSU_END

Fix new file ownership and permissions

/bin/chmod 644 /etc/pam.d/su/usr/sbin/chown root:wheel /etc/pam.d/su

See Also

https://workbench.cisecurity.org/benchmarks/24070

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-2(1), 800-53|IA-2(2), 800-53|IA-2(3), 800-53|IA-2(4), 800-53|IA-2(8), CAT|II, CCI|CCI-000765, CCI|CCI-000766, CCI|CCI-000767, CCI|CCI-000768, CCI|CCI-001941, CCI|CCI-004047, Rule-ID|SV-259548r1009601_rule, STIG-ID|APPL-14-003051, Vuln-ID|V-259548

Plugin: Unix

Control ID: 5034f7649f86557deceec9363d173c1e28bfd4805ab5d1d4ae7a3ab11a3f9e56