UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The operating system must implement cryptographic mechanisms to prevent unauthorized disclosure of all information at rest on organization-defined information system components.


Overview

Finding ID Version Rule ID IA Controls Severity
V-58393 AOSX-09-000786 SV-72823r1_rule Medium
Description
FileVault Disk Encryption must be enabled. This ensures that any data stored on the hard drive will be protected by cryptographic means when the system is powered off, mitigating the risk of unauthorized disclosure of that data. Selection of a cryptographic mechanism is based on the need to protect the integrity of organizational information. The strength of the mechanism is commensurate with the security category and/or classification of the information. Organizations have the flexibility to either encrypt all information on storage devices (i.e., full disk encryption) or encrypt specific data structures (e.g., files, records, or fields).
STIG Date
Apple OS X 10.9 (Mavericks) Workstation Security Technical Implementation Guide 2017-01-05

Details

Check Text ( C-59219r1_chk )
To check if FileVault 2 is enabled, run the following command:

sudo fdesetup status

If FileVault is 'Off', and the device is a laptop, this is a finding.
Fix Text (F-63709r3_fix)
Open System Preferences->Security & Privacy, and navigate to the FileVault tab. Use this panel to configure full-disk encryption.

Alternately, from the command line, run the following command to enable FileVault:

sudo fdesetup enable

After FileVault is initially set up, additional users can be added.