UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The macOS system must configure audit log files to not contain access control lists.


Overview

Finding ID Version Rule ID IA Controls Severity
V-259432 APPL-14-000030 SV-259432r958434_rule Medium
Description
The audit log files must not contain access control lists (ACLs). This rule ensures that audit information and audit files are configured to be readable and writable only by system administrators, thereby preventing unauthorized access, modification, and deletion of files. Satisfies: SRG-OS-000057-GPOS-00027,SRG-OS-000058-GPOS-00028,SRG-OS-000059-GPOS-00029,SRG-OS-000256-GPOS-00097,SRG-OS-000257-GPOS-00098,SRG-OS-000258-GPOS-00099
STIG Date
Apple macOS 14 (Sonoma) Security Technical Implementation Guide 2024-05-30

Details

Check Text ( C-63171r940916_chk )
Verify the macOS system is configured without ACLs applied to log files with the following command:

/bin/ls -le $(/usr/bin/grep '^dir' /etc/security/audit_control | /usr/bin/awk -F: '{print $2}') | /usr/bin/awk '{print $1}' | /usr/bin/grep -c ":"

If the result is not "0", this is a finding.
Fix Text (F-63079r940917_fix)
Configure the macOS system without ACLs applied to log files with the following command:

/bin/chmod -RN /var/audit