UCF STIG Viewer Logo

The operating system must limit privileges to change software resident within software libraries.


Overview

Finding ID Version Rule ID IA Controls Severity
V-59623 AOSX-10-000435 SV-74053r1_rule Medium
Description
File permissions should be compared against the default set of permissions that were set at the time of the initial install. Changes to default file permissions can make the system less secure and disrupt the functionality of installed applications. Unless changes are required to harden a system, the default permissions should be kept. If the operating system were to allow any user to make changes to software libraries, then those changes might be implemented without undergoing the appropriate testing and approvals that are part of a robust change management process. Verifying that permissions remain unchanged mitigates this risk. This requirement applies to operating systems with software libraries that are accessible and configurable, as in the case of interpreted languages. Software libraries also include privileged programs which execute with escalated privileges. Only qualified and authorized individuals shall be allowed to obtain access to information system components for purposes of initiating changes, including upgrades and modifications.
STIG Date
Apple OS X 10.10 (Yosemite) Workstation Security Technical Implementation Guide 2017-04-06

Details

Check Text ( C-60393r1_chk )
To check the permissions and ownership of the system files and make sure they haven't changed from the original installation, run the following command:

sudo diskutil verifyPermissions /

Any results indicating User/Group/Permissions differ, this is a finding.
Fix Text (F-65033r1_fix)
To correct ownership and permissions of files found in the check, run the following command:

sudo diskutil repairPermissions /