UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The macOS system must be configured so that end users cannot override Gatekeeper settings.


Overview

Finding ID Version Rule ID IA Controls Severity
V-209603 AOSX-14-002061 SV-209603r610285_rule Medium
Description
Gatekeeper must be configured with a configuration profile to prevent normal users from overriding its setting. If users are allowed to disable Gatekeeper or set it to a less restrictive setting, malware could be introduced into the system. Gatekeeper is a security feature that ensures applications must be digitally signed by an Apple-issued certificate in order to run. Digital signatures allow the macOS host to verify the application has not been modified by a malicious third party.
STIG Date
Apple OS X 10.14 (Mojave) Security Technical Implementation Guide 2020-12-11

Details

Check Text ( C-9854r282291_chk )
To verify only applications downloaded from the App Store are allowed to run, type the following command:

/usr/sbin/system_profiler SPConfigurationProfileDataType | /usr/bin/grep DisableOverride

If the return is null or is not the following, this is a finding:
DisableOverride = 1;
Fix Text (F-9854r282292_fix)
This setting is enforced using the "RestrictionsPolicy" configuration profile.