STIGQter STIGQter: STIG Summary: Apple OS X 10.14 (Mojave) Security Technical Implementation Guide Version: 2 Release: 3 Benchmark Date: 23 Apr 2021:

The macOS system must be configured with the SSH daemon ClientAliveInterval option set to 900 or less.

DISA Rule

SV-209546r610285_rule

Vulnerability Number

V-209546

Group Title

SRG-OS-000163-GPOS-00072

Rule Version

AOSX-14-000051

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

To ensure that "ClientAliveInterval" is set correctly, run the following command:

/usr/bin/sudo /usr/bin/sed -i.bak 's/.*ClientAliveInterval.*/ClientAliveInterval 900/' /etc/ssh/sshd_config

Check Contents

The SSH daemon "ClientAliveInterval" option must be set correctly. To check the idle timeout setting for SSH sessions, run the following:

/usr/bin/sudo /usr/bin/grep ^ClientAliveInterval /etc/ssh/sshd_config

If the setting is not "900" or less, this is a finding.

Vulnerability Number

V-209546

Documentable

False

Rule Version

AOSX-14-000051

Severity Override Guidance

The SSH daemon "ClientAliveInterval" option must be set correctly. To check the idle timeout setting for SSH sessions, run the following:

/usr/bin/sudo /usr/bin/grep ^ClientAliveInterval /etc/ssh/sshd_config

If the setting is not "900" or less, this is a finding.

Check Content Reference

M

Target Key

2930

Comments