UCF STIG Viewer Logo

The macOS system must allow only applications that have a valid digital signature to run.


Overview

Finding ID Version Rule ID IA Controls Severity
V-225194 AOSX-15-002060 SV-225194r648724_rule Medium
Description
Gatekeeper settings must be configured correctly to only allow the system to run applications signed with a valid Apple Developer ID code. Administrator users will still have the option to override these settings on a per-app basis. Gatekeeper is a security feature that ensures that applications must be digitally signed by an Apple-issued certificate in order to run. Digital signatures allow the macOS host to verify that the application has not been modified by a malicious third party.
STIG Date
Apple OS X 10.15 (Catalina) Security Technical Implementation Guide 2022-06-06

Details

Check Text ( C-26893r648723_chk )
Identify any unsigned applications that have been installed on the system:
/usr/sbin/system_profiler SPApplicationsDataType | /usr/bin/grep -B 3 -A 4 -e "Obtained from: Unknown" | /usr/bin/grep -v -e "Location: /Library/Application Support/Script Editor/Templates" -e "Location: /System/Library/" | /usr/bin/awk -F "Location: " '{print $2}' | /usr/bin/sort -u

If any results are returned and is not documented with the Information System Security Officer (ISSO) as an operational requirement, this is a finding.

Verify only applications with a valid digital signature are allowed to run:

/usr/sbin/system_profiler SPConfigurationProfileDataType | /usr/bin/grep -E '(EnableAssessment | AllowIdentifiedDevelopers)'

If the return is null or is not the following, this is a finding:

AllowIdentifiedDevelopers = 1;
EnableAssessment = 1;
Fix Text (F-26881r467751_fix)
This setting is enforced using the "RestrictionsPolicy" configuration profile.