AOSX-13-000240 - The macOS system must enable System Integrity Protection.

Information

The System Integrity Protection is vital to prevent unauthorized and unintended information transfer via shared system resources, protect audit tools from unauthorized access, modification, and deletion, limit privileges to change software resident within software libraries, limit the ability of non-privileged users to grant other users direct access to the contents of their home directories/folders.

SIP also ensures the presence of an audit record generation capability for DoD-defined auditable events for all operating system components, supports on-demand and after-the-fact reporting requirements, does not alter original content or time ordering of audit records.

Satisfies: SRG-OS-000051-GPOS-00024, SRG-OS-000054-GPOS-00025, SRG-OS-000062-GPOS-00031, SRG-OS-000122-GPOS-00063, SRG-OS-000138-GPOS-00069, SRG-OS-000256-GPOS-00097, SRG-OS-000257-GPOS-00098, SRG-OS-000258-GPOS-00099, SRG-OS-000259-GPOS-00100, SRG-OS-000348-GPOS-00136, SRG-OS-000349-GPOS-00137, SRG-OS-000350-GPOS-00138, SRG-OS-000351-GPOS-00139, SRG-OS-000352-GPOS-00140, SRG-OS-000353-GPOS-00141, SRG-OS-000354-GPOS-00142, SRG-OS-000480-GPOS-00228, SRG-OS-000480-GPOS-00230

Solution

To reenable 'System Integrity Protection', boot the affected system into 'Recovery' mode, launch 'Terminal' from the 'Utilities' menu, and run the following command:

/usr/bin/csrutil enable

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Apple_OS_X_10-13_V2R5_STIG.zip

Item Details

Category: AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|AU-6(4), 800-53|AU-7(1), 800-53|AU-7a., 800-53|AU-7b., 800-53|AU-9, 800-53|AU-12a., 800-53|CM-5(6), 800-53|CM-6b., 800-53|SC-4, CAT|II, CCI|CCI-000154, CCI|CCI-000158, CCI|CCI-000169, CCI|CCI-000366, CCI|CCI-001090, CCI|CCI-001493, CCI|CCI-001494, CCI|CCI-001495, CCI|CCI-001499, CCI|CCI-001875, CCI|CCI-001876, CCI|CCI-001877, CCI|CCI-001878, CCI|CCI-001879, CCI|CCI-001880, CCI|CCI-001881, CCI|CCI-001882, Rule-ID|SV-214834r609363_rule, STIG-ID|AOSX-13-000240, STIG-Legacy|SV-96243, STIG-Legacy|V-81529, Vuln-ID|V-214834

Plugin: Unix

Control ID: 40acb5d136b176fc226fa16b50e602765ba9a682ee8374ddd2da8a65bd9386b0