UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The macOS system must allow only applications downloaded from the App Store or properly signed to run.


Overview

Finding ID Version Rule ID IA Controls Severity
V-81647 AOSX-13-000710 SV-96361r2_rule Medium
Description
Gatekeeper settings must be configured correctly to only allow the system to run applications downloaded from the Mac App Store or applications signed with a valid Apple Developer ID code. Administrator users will still have the option to override these settings on a per-app basis. Gatekeeper is a security feature that ensures that applications must be digitally signed by an Apple-issued certificate in order to run. Digital signatures allow the macOS host to verify that the application has not been modified by a malicious third party.
STIG Date
Apple OS X 10.13 Security Technical Implementation Guide 2020-05-29

Details

Check Text ( C-81423r1_chk )
To verify only applications downloaded from the App Store are allowed to run, type the following command:

/usr/sbin/system_profiler SPConfigurationProfileDataType | /usr/bin/grep -E '(EnableAssessment | AllowIdentifiedDevelopers)’

If the return is null, or is not:
AllowIdentifiedDevelopers = 1;
EnableAssessment = 1;
This is a finding.
Fix Text (F-88495r1_fix)
This setting is enforced using the "Security and Privacy Policy" configuration profile.