UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The system must allow only applications downloaded from the App Store to run.


Overview

Finding ID Version Rule ID IA Controls Severity
V-58379 AOSX-09-000710 SV-72809r1_rule Medium
Description
Gatekeeper settings must be configured correctly to only allow the system to run applications downloaded from the Mac App Store or applications signed with a valid Apple Developer ID code. Administrator users will still have the option to override these settings on a per app basis. Gatekeeper is a security feature that ensures that applications must be digitally signed by an Apple issued certificate in order to run. Digital signatures allow Mac OS X to verify that the application has not been modified by a malicious third party.
STIG Date
Apple OS X 10.9 (Mavericks) Workstation Security Technical Implementation Guide 2017-01-05

Details

Check Text ( C-59205r1_chk )
To check to make sure only applications downloaded from the App Store are allowed to run, type the following code:

system_profiler SPConfigurationProfileDataType | grep AllowIdentifiedDevelopers

If 'AllowIdentifiedDevelopers' is not set to '1', this is a finding.
Fix Text (F-63695r1_fix)
This setting is enforced using a configuration profile.