STIGQter STIGQter: STIG Summary: Apple macOS 11 (Big Sur) Security Technical Implementation Guide Version: 1 Release: 2 Benchmark Date: 23 Apr 2021:

The macOS system must be configured with audit log files group-owned by wheel.

DISA Rule

SV-230776r599842_rule

Vulnerability Number

V-230776

Group Title

SRG-OS-000057-GPOS-00027

Rule Version

APPL-11-001014

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

For any log file that returns an incorrect group owner, run the following command:

/usr/bin/sudo chgrp wheel [audit log file]

[audit log file] is the full path to the log file in question.

Check Contents

To check the group ownership of the audit log files, run the following command:

/usr/bin/sudo ls -le $(/usr/bin/sudo /usr/bin/grep '^dir' /etc/security/audit_control | awk -F: '{print $2}') | /usr/bin/grep -v current

The results should show the group owner (fourth column) to be "wheel".

If they do not, this is a finding.

Vulnerability Number

V-230776

Documentable

False

Rule Version

APPL-11-001014

Severity Override Guidance

To check the group ownership of the audit log files, run the following command:

/usr/bin/sudo ls -le $(/usr/bin/sudo /usr/bin/grep '^dir' /etc/security/audit_control | awk -F: '{print $2}') | /usr/bin/grep -v current

The results should show the group owner (fourth column) to be "wheel".

If they do not, this is a finding.

Check Content Reference

M

Target Key

5246

Comments