The macOS system must configure audit log files to not contain access control lists.

STIG ID: APPL-14-000030  |  SRG: SRG-OS-000057-GPOS-00027 | Severity: medium |  CCI: CCI-000162,CCI-000163,CCI-000164,CCI-001493,CCI-001494,CCI-001495

Vulnerability Discussion

The audit log files must not contain access control lists (ACLs).

This rule ensures that audit information and audit files are configured to be readable and writable only by system administrators, thereby preventing unauthorized access, modification, and deletion of files.

Satisfies: SRG-OS-000057-GPOS-00027,SRG-OS-000058-GPOS-00028,SRG-OS-000059-GPOS-00029,SRG-OS-000256-GPOS-00097,SRG-OS-000257-GPOS-00098,SRG-OS-000258-GPOS-00099

Check

Verify the macOS system is configured without ACLs applied to log files with the following command:

/bin/ls -le $(/usr/bin/grep '^dir' /etc/security/audit_control | /usr/bin/awk -F: '{print $2}') | /usr/bin/awk '{print $1}' | /usr/bin/grep -c ":"

If the result is not "0", this is a finding.

Fix

Configure the macOS system without ACLs applied to log files with the following command:

/bin/chmod -RN /var/audit