Files
macos_security/rules/inherent/os_prevent_restricted_software.yaml
2020-06-11 17:47:26 -04:00

30 lines
1.6 KiB
YAML

id: os_prevent_restricted_software
title: "Prevent program execution in accordance with policy"
discussion: |
Control of program execution is a mechanism used to prevent execution of unauthorized programs. Some operating systems may provide a capability that runs counter to the mission or provides users with functionality that exceeds mission requirements. This includes functions and services installed at the operating system-level.Some of the programs, installed by default, may be harmful or may not be necessary to support essential organizational operations (e.g., key missions, functions). Removal of executable programs is not always possible; therefore, establishing a method of preventing program execution is critical to maintaining a secure system baseline.Methods for complying with this requirement include restricting execution of programs in certain environments, while preventing execution in other environments; or limiting execution of certain program functionality based on organization-defined criteria (e.g., privileges, subnets, sandboxed environments, or roles).
check: |
The technology supports this requirement and cannot be configured to be out of compliance. The technology inherently meets this requirement.
fix: |
The technology inherently meets this requirement. No fix is required.
references:
cce:
- CCE-84886-1
cci:
- CCI-001764
800-53r4:
- CM-7(2)
disa_stig:
- AOSX-15-100030
srg:
- SRG-OS-000368-GPOS-00154
macOS:
- "10.15"
tags:
- cnssi-1253
- fisma-moderate
- fisma-high
- STIG
- inherent
mobileconfig: false
mobileconfig_info: