STIGQter STIGQter: STIG Summary: Apple OS X 10.13 Security Technical Implementation Guide Version: 1 Release: 4 Benchmark Date: 24 Jan 2020: The macOS system must be configured to disable the Network File System (NFS) lock daemon unless it is required.

DISA Rule

SV-96227r1_rule

Vulnerability Number

V-81513

Group Title

SRG-OS-000095-GPOS-00049

Rule Version

AOSX-13-000142

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

To disable the NFS lock daemon, run the following command:

/usr/bin/sudo /bin/launchctl disable system/com.apple.lockd

The system may need to be restarted for the update to take effect.

Check Contents

If the NFS lock daemon is required, this is not applicable.

To check if the NFS lock daemon is disabled, use the following command:

/usr/bin/sudo /bin/launchctl print-disabled system | /usr/bin/grep com.apple.lockd

If the results do not show the following, this is a finding:

"com.apple.lockd" => true

Vulnerability Number

V-81513

Documentable

False

Rule Version

AOSX-13-000142

Severity Override Guidance

If the NFS lock daemon is required, this is not applicable.

To check if the NFS lock daemon is disabled, use the following command:

/usr/bin/sudo /bin/launchctl print-disabled system | /usr/bin/grep com.apple.lockd

If the results do not show the following, this is a finding:

"com.apple.lockd" => true

Check Content Reference

M

Target Key

3329

Comments