UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The macOS system must have the security assessment policy subsystem enabled.


Overview

Finding ID Version Rule ID IA Controls Severity
V-252514 APPL-12-002064 SV-252514r816356_rule High
Description
Any changes to the hardware, software, and/or firmware components of the information system and/or application can potentially have significant effects on the overall security of the system. Accordingly, software defined by the organization as critical must be signed with a certificate that is recognized and approved by the organization.
STIG Date
Apple macOS 12 (Monterey) Security Technical Implementation Guide 2022-01-19

Details

Check Text ( C-55970r816354_chk )
To check the status of the Security assessment policy subsystem, run the following command:

/usr/sbin/spctl --status 2> /dev/null | /usr/bin/grep enabled

If "assessments enabled" is not returned, this is a finding.
Fix Text (F-55920r816355_fix)
To enable the Security assessment policy subsystem, run the following command:

/usr/bin/sudo /usr/sbin/spctl --master-enable