Check: AOSX-13-000558
Apple OS X 10.13 STIG:
AOSX-13-000558
(in versions v2 r5 through v1 r1)
Title
The macOS system must disable iCloud Keychain synchronization. (Cat II impact)
Discussion
Requiring individuals to be authenticated with an individual authenticator prior to using a group authenticator allows for traceability of actions, as well as adding an additional level of protection of the actions that can be taken with group account knowledge. Satisfies: SRG-OS-000095-GPOS-00049, SRG-OS-000370-GPOS-00155
Check Content
To view the setting for the iCloud Keychain Synchronization configuration, run the following command: /usr/sbin/system_profiler SPConfigurationProfileDataType | /usr/bin/grep allowCloudKeychainSync If the output is null or not "allowCloudKeychainSync = 0" this is a finding.
Fix Text
This setting is enforced using the "Restrictions" configuration profile.
Additional Identifiers
Rule ID: SV-214872r609363_rule
Vulnerability ID: V-214872
Group Title: SRG-OS-000095-GPOS-00049
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000381 |
The organization configures the information system to provide only essential capabilities. |
CCI-001774 |
The organization employs a deny-all, permit-by-exception policy to allow the execution of authorized software programs on the information system. |