UCF STIG Viewer Logo

The macOS system must authenticate peripherals before establishing a connection.


Overview

Finding ID Version Rule ID IA Controls Severity
V-252517 APPL-12-002069 SV-252517r853300_rule Medium
Description
Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. Peripherals include, but are not limited to, such devices as flash drives, external storage, and printers.
STIG Date
Apple macOS 12 (Monterey) Security Technical Implementation Guide 2022-09-07

Details

Check Text ( C-55973r816363_chk )
To check that macOS is configured to require authentication to all system preference panes, use the following commands:

/usr/bin/sudo /usr/bin/security authorizationdb read system.preferences | grep -A1 shared

If what is returned does not include the following, this is a finding.
shared
Fix Text (F-55923r853299_fix)
To ensure that authentication is required to access all system level preference panes use the following procedure:

Copy the authorization database to a file using the following command:
/usr/bin/sudo /usr/bin/security authorizationdb read system.preferences > ~/Desktop/authdb.txt
edit the file to change:
shared

To read:
shared


Reload the authorization database with the following command:
/usr/bin/sudo /usr/bin/security authorizationdb write system.preferences < ~/Desktop/authdb.txt