UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The macOS system must allow only applications that have a valid digital signature to run.


Overview

Finding ID Version Rule ID IA Controls Severity
V-252511 APPL-12-002060 SV-252511r816347_rule Medium
Description
Gatekeeper settings must be configured correctly to only allow the system to run applications signed with a valid Apple Developer ID code. Administrator users will still have the option to override these settings on a per-app basis. Gatekeeper is a security feature that ensures that applications must be digitally signed by an Apple-issued certificate in order to run. Digital signatures allow the macOS host to verify that the application has not been modified by a malicious third party.
STIG Date
Apple macOS 12 (Monterey) Security Technical Implementation Guide 2023-02-13

Details

Check Text ( C-55967r816345_chk )
Identify any unsigned applications that have been installed on the system:
/usr/sbin/system_profiler SPApplicationsDataType | /usr/bin/grep -B 3 -A 4 -e "Obtained from: Unknown" | /usr/bin/grep -v -e "Location: /Library/Application Support/Script Editor/Templates" -e "Location: /System/Library/" | /usr/bin/awk -F "Location: " '{print $2}' | /usr/bin/sort -u

If any results are returned and is not documented with the Information System Security Officer (ISSO) as an operational requirement, this is a finding.

Verify only applications with a valid digital signature are allowed to run:

/usr/sbin/system_profiler SPConfigurationProfileDataType | /usr/bin/grep -E '(EnableAssessment | AllowIdentifiedDevelopers)'

If the return is null or is not the following, this is a finding:

AllowIdentifiedDevelopers = 1;
EnableAssessment = 1;
Fix Text (F-55917r816346_fix)
This setting is enforced using the "Restrictions Policy" configuration profile.