Check: APPL-26-002003
Apple macOS 26 (Tahoe) STIG:
APPL-26-002003
(in version v1 r1)
Title
The macOS system must disable Network File System (NFS) service. (Cat II impact)
Discussion
Support for NFS services is nonessential and, therefore, must be disabled. Enabling any service increases the attack surface for an intruder. By disabling unnecessary services, the attack surface is minimized.
Check Content
Verify the macOS system is configured to disable NFS service with the following commands: isDisabled=$(/sbin/nfsd status | /usr/bin/awk '/nfsd service/ {print $NF}') if [[ "$isDisabled" == "disabled" ]] && [[ -z $(/usr/bin/pgrep nfsd) ]]; then echo "pass" else echo "fail" fi If the result is not "pass", this is a finding.
Fix Text
Configure the macOS system to disable NFS service with the following commands: /bin/launchctl disable system/com.apple.nfsd /bin/rm -rf /etc/exports The system may need a restart for the update to take effect.
Additional Identifiers
Rule ID: SV-277086r1148710_rule
Vulnerability ID: V-277086
Group Title: SRG-OS-000080-GPOS-00048
Expert Comments
CCIs
| Number | Definition |
|---|---|
| CCI-000213 |
Enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies. |
Controls
| Number | Title |
|---|---|
| AC-3 |
Access Enforcement |