Check: OSX8-00-00455
Apple OSX 10.8 STIG:
OSX8-00-00455
(in version v1 r2)
Title
The operating system must employ automated mechanisms to centrally verify configuration settings. (Cat II impact)
Discussion
Configuration settings are the configurable security-related parameters of information technology products that are part of the information system. Security-related parameters are those parameters impacting the security state of the system including parameters related to meeting other security control requirements. Rather than visiting each and every system when verifying configuration changes, organizations will employ automated tools that can make changes across all systems. This greatly increases efficiency and manageability of applications in a large scale environment.
Check Content
To check if the computer has a configuration profile applied to the workstation, run the following command: sudo profiles -H If there are no profiles installed, this is a finding.
Fix Text
Obtain a configuration profile from an MDM or trusted provider containing the configuration settings required to be applied.
Additional Identifiers
Rule ID: SV-65849r1_rule
Vulnerability ID: V-51639
Group Title:
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-000372 |
The organization employs automated mechanisms to centrally verify configuration settings for organization-defined information system components. |
Controls
Number | Title |
---|---|
CM-6 (1) |
Automated Central Management / Application / Verification |