UCF STIG Viewer Logo

The macOS system must configure audit log files to not contain access control lists.


Overview

Finding ID Version Rule ID IA Controls Severity
V-259432 APPL-14-000030 SV-259432r940918_rule Medium
Description
The audit log files must not contain access control lists (ACLs). This rule ensures that audit information and audit files are configured to be readable and writable only by system administrators, thereby preventing unauthorized access, modification, and deletion of files. Satisfies: SRG-OS-000057-GPOS-00027,SRG-OS-000058-GPOS-00028,SRG-OS-000059-GPOS-00029,SRG-OS-000256-GPOS-00097,SRG-OS-000257-GPOS-00098,SRG-OS-000258-GPOS-00099
STIG Date
Apple macOS 14 (Sonoma) Security Technical Implementation Guide 2024-01-10

Details

Check Text ( C-63171r940916_chk )
Verify the macOS system is configured without ACLs applied to log files with the following command:

/bin/ls -le $(/usr/bin/grep '^dir' /etc/security/audit_control | /usr/bin/awk -F: '{print $2}') | /usr/bin/awk '{print $1}' | /usr/bin/grep -c ":"

If the result is not "0", this is a finding.
Fix Text (F-63079r940917_fix)
Configure the macOS system without ACLs applied to log files with the following command:

/bin/chmod -RN /var/audit