Check: APPL-11-005051
Apple macOS 11 (Big Sur) STIG:
APPL-11-005051
(in versions v1 r5 through v1 r4)
Title
The macOS system must restrict the ability of individuals to use USB storage devices. (Cat II impact)
Discussion
External writeable media devices must be disabled for users. External USB devices are a potential vector for malware and can be used to exfiltrate sensitive data if an approved data-loss prevention (DLP) solution is not installed.
Check Content
Verify the system is configured to disable USB storage devices: $ /usr/sbin/system_profiler SPConfigurationProfileDataType | /usr/bin/egrep -A 3 'blankbd|blankcd|blankdvd|disk-image|dvdram|harddisk-external' “blankbd" = ( deny, eject ); “blankcd" = ( deny, eject ); “blankdvd" = ( deny, eject ); “disk-image" = ( deny, eject ); “dvdram" = ( deny, eject ); “harddisk-external" = ( deny, eject ); If the result does not match the output above, this is a finding.
Fix Text
This setting is enforced using the "Restrictions Policy" configuration profile.
Additional Identifiers
Rule ID: SV-250320r802395_rule
Vulnerability ID: V-250320
Group Title: SRG-OS-000480-GPOS-00227
Expert Comments
CCIs
| Number | Definition |
|---|---|
| CCI-000366 |
Implement the security configuration settings. |
Controls
| Number | Title |
|---|---|
| CM-6 |
Configuration Settings |