UCF STIG Viewer Logo

The macOS system must configure audit_control to mode 440 or less permissive.


Overview

Finding ID Version Rule ID IA Controls Severity
V-259475 APPL-14-001130 SV-259475r941047_rule Medium
Description
/etc/security/audit_control must be configured so that it is readable only by the root user and group wheel. Satisfies: SRG-OS-000057-GPOS-00027,SRG-OS-000058-GPOS-00028,SRG-OS-000059-GPOS-00029,SRG-OS-000063-GPOS-00032,SRG-OS-000256-GPOS-00097,SRG-OS-000257-GPOS-00098,SRG-OS-000258-GPOS-00099
STIG Date
Apple macOS 14 (Sonoma) Security Technical Implementation Guide 2024-01-10

Details

Check Text ( C-63214r941045_chk )
Verify the macOS system is configured audit_control to mode 440 or less with the following command:

/bin/ls -l /etc/security/audit_control | /usr/bin/awk '!/-r--[r-]-----|current|total/{print $1}' | /usr/bin/wc -l | /usr/bin/xargs

If the results are not "0", this is a finding.
Fix Text (F-63122r941046_fix)
Configure the macOS system with the audit_control to mode 440 with the following command:

/bin/chmod 440 /etc/security/audit_control