UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The macOS system must restrict the ability of individuals to use USB storage devices.


Overview

Finding ID Version Rule ID IA Controls Severity
V-81663 AOSX-13-000850 SV-96377r1_rule Medium
Description
External hard drives, such as USB, must be disabled for users. USB hard drives are a potential vector for malware and can be used to exfiltrate sensitive data if an approved data-loss prevention (DLP) solution is not installed.
STIG Date
Apple OS X 10.13 Security Technical Implementation Guide 2019-12-20

Details

Check Text ( C-81439r1_chk )
If an approved HBSS DCM/DLP solution is installed, this is not applicable.

To verify external USB drives are disabled, run the following command:

/usr/sbin/system_profiler SPConfigurationProfileDataType | /usr/bin/grep -A 3 harddisk-external

If the result is not “harddisk-external" = (
eject,
alert
);”, this is a finding.
Fix Text (F-88511r1_fix)
This setting is enforced using the "Restrictions Policy" configuration profile.