UCF STIG Viewer Logo

The Security assessment policy subsystem must be enabled.


Overview

Finding ID Version Rule ID IA Controls Severity
V-67559 AOSX-11-000430 SV-82049r1_rule High
Description
Any changes to the hardware, software, and/or firmware components of the information system and/or application can potentially have significant effects on the overall security of the system. Accordingly, software defined by the organization as critical software must be signed with a certificate that is recognized and approved by the organization.
STIG Date
Apple OS X 10.11 Security Technical Implementation Guide 2018-01-04

Details

Check Text ( C-68125r1_chk )
To check the status of the Security assessment policy subsystem, run the following command:

/usr/bin/sudo /usr/sbin/spctl --status | /usr/bin/grep enabled

If nothing is returned, this is a finding.
Fix Text (F-73673r1_fix)
To enable the Security assessment policy subsystem, run the following command:

/usr/bin/sudo /usr/sbin/spctl --master-enable