APPL-13-001100 - The macOS system must require individuals to be authenticated with an individual authenticator prior to using a group authenticator.

Information

Administrator users must never log in directly as root. To assure individual accountability and prevent unauthorized access, logging in as root over a remote connection must be disabled. Administrators must only run commands as root after first authenticating with their individual usernames and passwords.

Solution

Configure the macOS system to disable root logins over SSH with the following command:

/usr/bin/sudo /usr/bin/sed -i.bak 's/^[#]*PermitRootLogin.*/PermitRootLogin no/' /etc/ssh/sshd_config

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Apple_macOS_13_V1R3_STIG.zip

Item Details

Category: IDENTIFICATION AND AUTHENTICATION

References: 800-53|IA-2(5), CAT|II, CCI|CCI-000770, Rule-ID|SV-257184r905185_rule, STIG-ID|APPL-13-001100, Vuln-ID|V-257184

Plugin: Unix

Control ID: c1118558af9940e050ae88221b1810cb3a097070fae31609fb46f80aa31820af