STIGQter STIGQter: STIG Summary: Apple OS X 10.14 (Mojave) Security Technical Implementation Guide Version: 2 Release: 3 Benchmark Date: 23 Apr 2021:

The macOS system must implement cryptographic mechanisms to protect the confidentiality and integrity of all information at rest.

DISA Rule

SV-209636r610285_rule

Vulnerability Number

V-209636

Group Title

SRG-OS-000185-GPOS-00079

Rule Version

AOSX-14-005020

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Open System Preferences >> Security and Privacy and navigate to the "FileVault" tab. Use this panel to configure full-disk encryption.

Alternately, from the command line, run the following command to enable "FileVault":

/usr/bin/sudo /usr/bin/fdesetup enable

After "FileVault" is initially set up, additional users can be added.

Check Contents

To check if "FileVault 2" is enabled, run the following command:

/usr/bin/sudo /usr/bin/fdesetup status

If "FileVault" is "Off" and the device is a mobile device or the organization has determined that the drive must encrypt data at rest, this is a finding.

Vulnerability Number

V-209636

Documentable

False

Rule Version

AOSX-14-005020

Severity Override Guidance

To check if "FileVault 2" is enabled, run the following command:

/usr/bin/sudo /usr/bin/fdesetup status

If "FileVault" is "Off" and the device is a mobile device or the organization has determined that the drive must encrypt data at rest, this is a finding.

Check Content Reference

M

Target Key

2930

Comments