STIGQter STIGQter: STIG Summary: Apple OS X 10.15 (Catalina) Security Technical Implementation Guide Version: 1 Release: 4 Benchmark Date: 23 Apr 2021:

The macOS system must be configured with the SSH daemon LoginGraceTime set to 30 or less.

DISA Rule

SV-225141r610901_rule

Vulnerability Number

V-225141

Group Title

SRG-OS-000163-GPOS-00072

Rule Version

AOSX-15-000053

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

To ensure that "LoginGraceTime" is configured correctly, run the following command:

/usr/bin/sudo /usr/bin/sed -i.bak 's/.*LoginGraceTime.*/LoginGraceTime 30/' /etc/ssh/sshd_config

Check Contents

The SSH daemon "LoginGraceTime" must be set correctly. To check the amount of time that a user can log on through SSH, run the following command:

/usr/bin/sudo /usr/bin/grep ^LoginGraceTime /etc/ssh/sshd_config

If the value is not set to "30" or less, this is a finding.

Vulnerability Number

V-225141

Documentable

False

Rule Version

AOSX-15-000053

Severity Override Guidance

The SSH daemon "LoginGraceTime" must be set correctly. To check the amount of time that a user can log on through SSH, run the following command:

/usr/bin/sudo /usr/bin/grep ^LoginGraceTime /etc/ssh/sshd_config

If the value is not set to "30" or less, this is a finding.

Check Content Reference

M

Target Key

4212

Comments