STIGQter STIGQter: STIG Summary: Apple macOS 11 (Big Sur) Security Technical Implementation Guide Version: 1 Release: 2 Benchmark Date: 23 Apr 2021:

The macOS system must be configured with the SSH daemon ClientAliveCountMax option set to 0.

DISA Rule

SV-230765r599842_rule

Vulnerability Number

V-230765

Group Title

SRG-OS-000163-GPOS-00072

Rule Version

APPL-11-000052

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

To ensure that the SSH idle timeout occurs precisely when the "ClientAliveCountMax" is set, run the following command:

/usr/bin/sudo /usr/bin/sed -i.bak 's/.*ClientAliveCountMax.*/ClientAliveCountMax 0/' /etc/ssh/sshd_config

Check Contents

The SSH daemon "ClientAliveCountMax" option must be set correctly. To verify the SSH idle timeout will occur when the "ClientAliveCountMax" is set, run the following command:

/usr/bin/grep ^ClientAliveCountMax /etc/ssh/sshd_config

If the setting is not "ClientAliveCountMax 0", this is a finding.

Vulnerability Number

V-230765

Documentable

False

Rule Version

APPL-11-000052

Severity Override Guidance

The SSH daemon "ClientAliveCountMax" option must be set correctly. To verify the SSH idle timeout will occur when the "ClientAliveCountMax" is set, run the following command:

/usr/bin/grep ^ClientAliveCountMax /etc/ssh/sshd_config

If the setting is not "ClientAliveCountMax 0", this is a finding.

Check Content Reference

M

Target Key

5246

Comments