STIGQter STIGQter: STIG Summary: Apple OS X 10.14 (Mojave) Security Technical Implementation Guide Version: 2 Release: 3 Benchmark Date: 23 Apr 2021:

The macOS system must be configured so that log folders must not contain access control lists (ACLs).

DISA Rule

SV-209543r610285_rule

Vulnerability Number

V-209543

Group Title

SRG-OS-000057-GPOS-00027

Rule Version

AOSX-14-000031

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

For any log folder that contains ACLs, run the following command:

/usr/bin/sudo chmod -N [audit log folder]

Check Contents

To check if a log folder contains ACLs, run the following commands:

/usr/bin/sudo ls -lde $(/usr/bin/sudo /usr/bin/grep '^dir' /etc/security/audit_control | awk -F: '{print $2}')

In the output from the above commands, ACLs will be listed under any folder that may contain them (e.g., "0: group:admin allow list,readattr,reaadextattr,readsecurity").

If any such line exists, this is a finding.

Vulnerability Number

V-209543

Documentable

False

Rule Version

AOSX-14-000031

Severity Override Guidance

To check if a log folder contains ACLs, run the following commands:

/usr/bin/sudo ls -lde $(/usr/bin/sudo /usr/bin/grep '^dir' /etc/security/audit_control | awk -F: '{print $2}')

In the output from the above commands, ACLs will be listed under any folder that may contain them (e.g., "0: group:admin allow list,readattr,reaadextattr,readsecurity").

If any such line exists, this is a finding.

Check Content Reference

M

Target Key

2930

Comments