Files
macos_security/rules/sysprefs/sysprefs_ssh_disable.yaml
Dan Brodjieski 899818d9f4 updated CIS refs
2022-02-17 16:09:19 -05:00

62 lines
1.2 KiB
YAML

id: sysprefs_ssh_disable
title: "Disable SSH Server for Remote Access Sessions"
discussion: |
SSH service _MUST_ be disabled for remote access.
Remote access sessions _MUST_ use FIPS validated encrypted methods to protect unauthorized individuals from gaining access.
check: |
/bin/launchctl print-disabled system | /usr/bin/grep -c '"com.openssh.sshd" => true'
result:
integer: 1
fix: |
[source,bash]
----
/bin/launchctl disable system/com.openssh.sshd
----
references:
cce:
- CCE-91077-8
cci:
- N/A
800-53r5:
- CM-7
- CM-7(1)
- AC-17
800-53r4:
- AC-3
- CM-7
- CM-7(1)
srg:
- SRG-OS-000250-GPOS-00093
- SRG-OS-000033-GPOS-00014
- SRG-OS-000319-GPOS-00164
- SRG-OS-000393-GPOS-00173
- SRG-OS-000394-GPOS-00174
- SRG-OS-000112-GPOS-00057
- SRG-OS-000113-GPOS-00058
- SRG-OS-000423-GPOS-00187
- SRG-OS-000424-GPOS-00188
- SRG-OS-000425-GPOS-00189
- SRG-OS-000426-GPOS-00190
disa_stig:
- APPL-12-000011
800-171r2:
- 3.1.1
- 3.1.2
- 3.4.6
cis:
benchmark:
- 2.4.5 (level 1)
v8:
- 4.1
- 4.8
macOS:
- "12.0"
tags:
- cis_lvl1
- cis_lvl2
- cisv8
- stig
severity: "medium"
mobileconfig: false
mobileconfig_info: