AOSX-15-002064 - The macOS system must have the security assessment policy subsystem enabled.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Any changes to the hardware, software, and/or firmware components of the information system and/or application can potentially have significant effects on the overall security of the system.

Accordingly, software defined by the organization as critical must be signed with a certificate that is recognized and approved by the organization.

Solution

To enable the Security assessment policy subsystem, run the following command:

/usr/bin/sudo /usr/sbin/spctl --master-enable

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Apple_OS_X_10-15_V1R7_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-5, CAT|I, CCI|CCI-001749, Rule-ID|SV-225198r610901_rule, STIG-ID|AOSX-15-002064, STIG-Legacy|SV-111777, STIG-Legacy|V-102815, Vuln-ID|V-225198

Plugin: Unix

Control ID: f5546addd4ab77ce2225c93f027d70ae7106093650d847aab85770cbe6d80f1c