STIGQter STIGQter: STIG Summary: Apple OS X 10.15 (Catalina) Security Technical Implementation Guide Version: 1 Release: 4 Benchmark Date: 23 Apr 2021:

The macOS system must be configured so that the su command requires smart card authentication.

DISA Rule

SV-225214r610901_rule

Vulnerability Number

V-225214

Group Title

SRG-OS-000480-GPOS-00227

Rule Version

AOSX-15-003051

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Make a backup of the PAM SU settings using the following:

cp /etc/pam.d/su /etc/pam.d/su_backup_`date "+%Y-%m-%d_%H:%M"`

Replace the contents of "/etc/pam.d/su" with the following:

# su: auth account password session
auth sufficient pam_smartcard.so
auth required pam_rootok.so
auth required pam_group.so no_warn group=admin,wheel ruser root_only fail_safe
account required pam_permit.so
account required pam_opendirectory.so no_check_shell
password required pam_opendirectory.so
session required pam_launchd.so

Check Contents

For systems that are not utilizing smart card authentication, this is Not Applicable.

To verify that the "su" command has been configured to require smart card authentication, run the following command:

cat /etc/pam.d/su | grep -i pam_smartcard.so

If the text that returns does not include the line, "auth sufficient pam_smartcard.so" at the TOP of the listing, this is a finding.

Vulnerability Number

V-225214

Documentable

False

Rule Version

AOSX-15-003051

Severity Override Guidance

For systems that are not utilizing smart card authentication, this is Not Applicable.

To verify that the "su" command has been configured to require smart card authentication, run the following command:

cat /etc/pam.d/su | grep -i pam_smartcard.so

If the text that returns does not include the line, "auth sufficient pam_smartcard.so" at the TOP of the listing, this is a finding.

Check Content Reference

M

Target Key

4212

Comments