Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-76183 | AOSX-12-362149 | SV-90871r1_rule | Medium |
Description |
---|
Allowing regular users to install software, without explicit privileges, creates the risk that untested or potentially malicious software will be installed on the system. Explicit privileges (escalated or administrative privileges) provide the regular user with explicit capabilities and control that exceeds the rights of a regular user. Operating system functionality will vary, and while users are not permitted to install unapproved software, there may be instances where the organization allows the user to install approved software packages, such as from an approved software repository. The operating system or software configuration management utility must enforce control of software installation by users based upon what types of software installations are permitted (e.g., updates and security patches to existing software) and what types of installations are prohibited (e.g., software whose pedigree with regard to being potentially malicious is unknown or suspect) by the organization. |
STIG | Date |
---|---|
Apple OS X 10.12 Security Technical Implementation Guide | 2018-01-04 |
Check Text ( C-75869r1_chk ) |
---|
To check if the system is configured to prohibit user installation of software, first check to ensure the Parental Controls are enabled with the following command: /usr/sbin/system_profiler SPConfigurationProfileDataType | /usr/bin/grep "familyControlsEnabled = 1;" If there is no result, this is a finding. Next, check that a blacklist has been properly configured for the user's home directories with the following command: /usr/sbin/system_profiler –xml SPConfigurationProfileDataType | /usr/bin/sed -n '/pathBlackList/,/key/p' | /usr/bin/grep " If there is no result, this is a finding. |
Fix Text (F-82821r1_fix) |
---|
This setting is enforced using the "Application Restrictions Policy" configuration profile. |