UCF STIG Viewer Logo

The operating system must limit privileges to change software resident within software libraries (including privileged programs).


Overview

Finding ID Version Rule ID IA Controls Severity
V-51433 OSX8-00-00435 SV-65643r1_rule Medium
Description
When dealing with change control issues, it should be noted that any changes to the hardware, software, and/or firmware components of the operating system can potentially have significant effects on the overall security of the system. Only qualified and authorized individuals must be allowed to obtain access to information system components for purposes of initiating changes, including upgrades and modifications.
STIG Date
Apple OS X 10.8 (Mountain Lion) Workstation STIG 2015-02-10

Details

Check Text ( C-53769r1_chk )
To check the permissions and ownership of the system files and make sure they haven't changed from the original installation, run the following command:

sudo diskutil verifyPermissions /

Any results indicating User/Group/Permissions differ is a finding.
Fix Text (F-56231r1_fix)
To correct ownership and permissions of files found in the check, run the following command:

sudo diskutil repairPermissions /