UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The macOS system must require individuals to be authenticated with an individual authenticator prior to using a group authenticator.


Overview

Finding ID Version Rule ID IA Controls Severity
V-257184 APPL-13-001100 SV-257184r905185_rule Medium
Description
Administrator users must never log in directly as root. To assure individual accountability and prevent unauthorized access, logging in as root over a remote connection must be disabled. Administrators must only run commands as root after first authenticating with their individual usernames and passwords.
STIG Date
Apple macOS 13 (Ventura) Security Technical Implementation Guide 2023-04-12

Details

Check Text ( C-60869r905183_chk )
If SSH is not being used, this is not applicable.

Verify the macOS system is configured to disable root logins over SSH with the following command:

/usr/bin/grep -r ^PermitRootLogin /etc/ssh/sshd_config*

If there is no result, or the result is set to "yes", this is a finding.

If conflicting results are returned, this is a finding.
Fix Text (F-60810r905184_fix)
Configure the macOS system to disable root logins over SSH with the following command:

/usr/bin/sudo /usr/bin/sed -i.bak 's/^[\#]*PermitRootLogin.*/PermitRootLogin no/' /etc/ssh/sshd_config