UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The Security assessment policy subsystem must be enabled.


Overview

Finding ID Version Rule ID IA Controls Severity
V-67559 AOSX-11-000430 SV-82049r1_rule High
Description
Any changes to the hardware, software, and/or firmware components of the information system and/or application can potentially have significant effects on the overall security of the system. Accordingly, software defined by the organization as critical software must be signed with a certificate that is recognized and approved by the organization.
STIG Date
Apple OS X 10.11 Security Technical Implementation Guide 2017-04-06

Details

Check Text ( C-68125r1_chk )
To check the status of the Security assessment policy subsystem, run the following command:

/usr/bin/sudo /usr/sbin/spctl --status | /usr/bin/grep enabled

If nothing is returned, this is a finding.
Fix Text (F-73673r1_fix)
To enable the Security assessment policy subsystem, run the following command:

/usr/bin/sudo /usr/sbin/spctl --master-enable