The macOS system must configure audit_control owner to root.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-277081 | APPL-26-001120 | SV-277081r1148695_rule | CCI-000162 | medium |
| Description | ||||
| /etc/security/audit_control must have the owner set to root. The audit service must be configured with the correct ownership to prevent normal users from manipulating audit log configurations. Satisfies: SRG-OS-000057-GPOS-00027, SRG-OS-000058-GPOS-00028, SRG-OS-000059-GPOS-00029, SRG-OS-000063-GPOS-00032, SRG-OS-000256-GPOS-00097, SRG-OS-000257-GPOS-00098, SRG-OS-000258-GPOS-00099 | ||||
| STIG | Date | |||
| Apple macOS 26 (Tahoe) Security Technical Implementation Guide | 2026-02-11 | |||
Details
Check Text (C-277081r1148695_chk)
Verify the macOS system is configured with the audit_control owner to root with the following command:
/bin/ls -dn /etc/security/audit_control | /usr/bin/awk '{print $3}'
If the result is not "0", this is a finding.
Fix Text (F-81141r1148694_fix)
Configure the macOS system with the audit_control owner to root with the following command:
/usr/sbin/chown root /etc/security/audit_control