STIGQter STIGQter: STIG Summary: Apple OS X 10.15 (Catalina) Security Technical Implementation Guide Version: 1 Release: 4 Benchmark Date: 23 Apr 2021:

The macOS system must implement cryptographic mechanisms to protect the confidentiality and integrity of all information at rest.

DISA Rule

SV-225220r610901_rule

Vulnerability Number

V-225220

Group Title

SRG-OS-000185-GPOS-00079

Rule Version

AOSX-15-005020

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Open System Preferences >> Security and Privacy and navigate to the "FileVault" tab. Use this panel to configure full-disk encryption.

Alternately, from the command line, run the following command to enable "FileVault":

/usr/bin/sudo /usr/bin/fdesetup enable

After "FileVault" is initially set up, additional users can be added.

Check Contents

Verify that "FileVault 2" is enabled by running the following command:

/usr/bin/sudo /usr/bin/fdesetup status

If "FileVault" is "Off" and the device is a mobile device or the organization has determined that the drive must encrypt data at rest, this is a finding.

Vulnerability Number

V-225220

Documentable

False

Rule Version

AOSX-15-005020

Severity Override Guidance

Verify that "FileVault 2" is enabled by running the following command:

/usr/bin/sudo /usr/bin/fdesetup status

If "FileVault" is "Off" and the device is a mobile device or the organization has determined that the drive must encrypt data at rest, this is a finding.

Check Content Reference

M

Target Key

4212

Comments