STIGQter: STIG Summary: Apple OS X 10.13 Security Technical Implementation Guide Version: 1 Release: 4 Benchmark Date: 24 Jan 2020: The macOS system must implement cryptographic mechanisms to protect the confidentiality and integrity of all information at rest.DISA Rule
SV-96373r1_rule
Vulnerability Number
V-81659
Group Title
SRG-OS-000185-GPOS-00079
Rule Version
AOSX-13-000780
Severity
CAT II
CCI(s)
- CCI-001199 - The information system protects the confidentiality and/or integrity of organization-defined information at rest.
- CCI-002475 - The information system implements cryptographic mechanisms to prevent unauthorized modification of organization-defined information at rest on organization-defined information system components.
- CCI-002476 - The information system implements cryptographic mechanisms to prevent unauthorized disclosure of organization-defined information at rest on organization-defined information system components.
Weight
10
Fix Recommendation
Open System Preferences >> Security and Privacy and navigate to the "FileVault" tab. Use this panel to configure full-disk encryption.
Alternately, from the command line, run the following command to enable "FileVault":
/usr/bin/sudo /usr/bin/fdesetup enable
After "FileVault" is initially set up, additional users can be added.
Check Contents
To check if "FileVault 2" is enabled, run the following command:
/usr/bin/sudo /usr/bin/fdesetup status
If "FileVault" is "Off" and the device is a mobile device or the organization has determined that the drive must encrypt data at rest, this is a finding.
Vulnerability Number
V-81659
Documentable
False
Rule Version
AOSX-13-000780
Severity Override Guidance
To check if "FileVault 2" is enabled, run the following command:
/usr/bin/sudo /usr/bin/fdesetup status
If "FileVault" is "Off" and the device is a mobile device or the organization has determined that the drive must encrypt data at rest, this is a finding.
Check Content Reference
M
Target Key
3329
Comments