UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The OS X system must allow only applications downloaded from the App Store to run.


Overview

Finding ID Version Rule ID IA Controls Severity
V-76085 AOSX-12-000710 SV-90773r1_rule Medium
Description
Gatekeeper settings must be configured correctly to only allow the system to run applications downloaded from the Mac App Store or applications signed with a valid Apple Developer ID code. Administrator users will still have the option to override these settings on a per-app basis. Gatekeeper is a security feature that ensures that applications must be digitally signed by an Apple-issued certificate in order to run. Digital signatures allow the OS X to verify that the application has not been modified by a malicious third party.
STIG Date
Apple OS X 10.12 Security Technical Implementation Guide 2018-12-24

Details

Check Text ( C-75769r1_chk )
To verify only applications downloaded from the App Store are allowed to run, type the following command:

/usr/sbin/system_profiler SPConfigurationProfileDataType | /usr/bin/grep EnableAssessment

If "EnableAssessment" is not set to "1", this is a finding.

/usr/sbin/system_profiler SPConfigurationProfileDataType | /usr/bin/grep AllowIdentifiedDevelopers

If "AllowIdentifiedDevelopers" is not set to "1", this is a finding.
Fix Text (F-82723r1_fix)
This setting is enforced using the "Security and Privacy Policy" configuration profile.