STIGQter STIGQter: STIG Summary: Apple OS X 10.13 Security Technical Implementation Guide Version: 1 Release: 4 Benchmark Date: 24 Jan 2020: The macOS system must implement cryptographic mechanisms to protect the confidentiality and integrity of all information at rest.

DISA Rule

SV-96373r1_rule

Vulnerability Number

V-81659

Group Title

SRG-OS-000185-GPOS-00079

Rule Version

AOSX-13-000780

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Open System Preferences >> Security and Privacy and navigate to the "FileVault" tab. Use this panel to configure full-disk encryption.

Alternately, from the command line, run the following command to enable "FileVault":

/usr/bin/sudo /usr/bin/fdesetup enable

After "FileVault" is initially set up, additional users can be added.

Check Contents

To check if "FileVault 2" is enabled, run the following command:

/usr/bin/sudo /usr/bin/fdesetup status

If "FileVault" is "Off" and the device is a mobile device or the organization has determined that the drive must encrypt data at rest, this is a finding.

Vulnerability Number

V-81659

Documentable

False

Rule Version

AOSX-13-000780

Severity Override Guidance

To check if "FileVault 2" is enabled, run the following command:

/usr/bin/sudo /usr/bin/fdesetup status

If "FileVault" is "Off" and the device is a mobile device or the organization has determined that the drive must encrypt data at rest, this is a finding.

Check Content Reference

M

Target Key

3329

Comments