AOSX-13-000430 - The macOS system must have the security assessment policy subsystem enabled.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Any changes to the hardware, software, and/or firmware components of the information system and/or application can potentially have significant effects on the overall security of the system.

Accordingly, software defined by the organization as critical must be signed with a certificate that is recognized and approved by the organization.

Solution

To enable the Security assessment policy subsystem, run the following command:

/usr/bin/sudo /usr/sbin/spctl --master-enable

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Apple_OS_X_10-13_V2R3_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-7(4), CAT|I, CCI|CCI-001749, Rule-ID|SV-214847r609363_rule, STIG-ID|AOSX-13-000430, STIG-Legacy|SV-96269, STIG-Legacy|V-81555, Vuln-ID|V-214847

Plugin: Unix

Control ID: 577d8ff93c57f5c030c4ff4e9f337c86f5b9d62b081d7ba1635ff93a34142140