2.10 Disable Core Dumps

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Since it is possible for a core dump to contain sensitive information, including passwords, it is recommended that core dumps be disabled in high security scenarios.

Solution

Perform the following to implement the prescribed state:
Run the following command in Terminal:
launchctl limit core 0

See Also

https://benchmarks.cisecurity.org/tools2/osx/CIS_Apple_OSX_10.9_Benchmark_v1.0.0.pdf

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-6

Plugin: Unix

Control ID: f867fc5ef2a25015f00b734a551548318a913fc7cf65d36322958abe473de649