STIGQter STIGQter: STIG Summary: Apple OS X 10.15 (Catalina) Security Technical Implementation Guide Version: 1 Release: 4 Benchmark Date: 23 Apr 2021:

The macOS system must be configured with audit log folders owned by root.

DISA Rule

SV-225147r610901_rule

Vulnerability Number

V-225147

Group Title

SRG-OS-000057-GPOS-00027

Rule Version

AOSX-15-001013

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

For any log folder that has an incorrect owner, run the following command:

/usr/bin/sudo chown root [audit log folder]

Check Contents

To check the ownership of the audit log folder, run the following command:

/usr/bin/sudo ls -lde $(/usr/bin/sudo /usr/bin/grep '^dir' /etc/security/audit_control | awk -F: '{print $2}')

The results should show the owner (third column) to be "root".

If it does not, this is a finding.

Vulnerability Number

V-225147

Documentable

False

Rule Version

AOSX-15-001013

Severity Override Guidance

To check the ownership of the audit log folder, run the following command:

/usr/bin/sudo ls -lde $(/usr/bin/sudo /usr/bin/grep '^dir' /etc/security/audit_control | awk -F: '{print $2}')

The results should show the owner (third column) to be "root".

If it does not, this is a finding.

Check Content Reference

M

Target Key

4212

Comments