APPL-12-001100 - The macOS system must require individuals to be authenticated with an individual authenticator prior to using a group authenticator.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Administrator users must never log in directly as root. To assure individual accountability and prevent unauthorized access, logging in as root over a remote connection must be disabled. Administrators should only run commands as root after first authenticating with their individual user names and passwords.

Solution

To ensure that 'PermitRootLogin' is disabled by sshd, run the following command:

/usr/bin/sudo /usr/bin/sed -i.bak 's/^[#]*PermitRootLogin.*/PermitRootLogin no/' /etc/ssh/sshd_config

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Apple_macOS_12_V1R3_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000770, Rule-ID|SV-252478r816248_rule, STIG-ID|APPL-12-001100, Vuln-ID|V-252478

Plugin: Unix

Control ID: e4dee834555cf76b7a07350ddcfe19e35f2f73ee5f8518fae68c96e9fc727fa9