Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-209602 | AOSX-14-002060 | SV-209602r648722_rule | Medium |
Description |
---|
Gatekeeper settings must be configured correctly to only allow the system to run applications signed with a valid Apple Developer ID code. Administrator users will still have the option to override these settings on a per-app basis. Gatekeeper is a security feature that ensures that applications must be digitally signed by an Apple-issued certificate in order to run. Digital signatures allow the macOS host to verify that the application has not been modified by a malicious third party. |
STIG | Date |
---|---|
Apple OS X 10.14 (Mojave) Security Technical Implementation Guide | 2021-06-21 |
Check Text ( C-9853r648721_chk ) |
---|
Identify any unsigned applications that have been installed on the system: /usr/sbin/system_profiler SPApplicationsDataType | /usr/bin/grep -B 3 -A 4 -e "Obtained from: Unknown" | /usr/bin/grep -v -e "Location: /Library/Application Support/Script Editor/Templates" -e "Location: /System/Library/" | /usr/bin/awk -F "Location: " '{print $2}' | /usr/bin/sort -u If any results are returned and is not documented with the Information System Security Officer (ISSO) as an operational requirement, this is a finding. Verify only applications with a valid digital signature are allowed to run: /usr/sbin/system_profiler SPConfigurationProfileDataType | /usr/bin/grep -E '(EnableAssessment | AllowIdentifiedDevelopers)' If the return is null, or is not the following, this is a finding: AllowIdentifiedDevelopers = 1; EnableAssessment = 1; |
Fix Text (F-9853r282289_fix) |
---|
This setting is enforced using the "Restrictions Policy" configuration profile |