UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The system must allow only applications downloaded from the App Store to run.


Overview

Finding ID Version Rule ID IA Controls Severity
V-67617 AOSX-11-000710 SV-82107r2_rule Medium
Description
Gatekeeper settings must be configured correctly to only allow the system to run applications downloaded from the Mac App Store or applications signed with a valid Apple Developer ID code. Administrator users will still have the option to override these settings on a per app basis. Gatekeeper is a security feature that ensures that applications must be digitally signed by an Apple issued certificate in order to run. Digital signatures allow the OS X to verify that the application has not been modified by a malicious third-party.
STIG Date
Apple OS X 10.11 Security Technical Implementation Guide 2017-01-05

Details

Check Text ( C-68183r2_chk )
To check to make sure only applications downloaded from the App Store are allowed to run, type the following command:

/usr/sbin/system_profiler SPConfigurationProfileDataType | /usr/bin/grep EnableAssessment

If "EnableAssessment" is not set to "1", this is a finding.

/usr/sbin/system_profiler SPConfigurationProfileDataType | /usr/bin/grep AllowIdentifiedDevelopers

If "AllowIdentifiedDevelopers" is not set to "1", this is a finding.
Fix Text (F-73731r1_fix)
This setting is enforced using the "Security Privacy Policy" configuration profile.