Files
macos_security/rules/sysprefs/sysprefs_ssh_disable.yaml
2021-07-15 15:18:33 -04:00

65 lines
1.3 KiB
YAML

id: sysprefs_ssh_disable
title: "Disable SSH Server for Remote Access Sessions"
discussion: |
SSH service _MUST_ be disabled for remote access.
Remote access sessions _MUST_ use FIPS validated encrypted methods to protect unauthorized individuals from gaining access.
check: |
/bin/launchctl print-disabled system | /usr/bin/grep -c '"com.openssh.sshd" => true'
result:
integer: 1
fix: |
[source,bash]
----
/bin/launchctl disable system/com.openssh.sshd
----
references:
cce:
- CCE-85447-1
cci:
- N/A
800-53r5:
- IA-2(8)
- AC-3
- CM-7
- CM-7(1)
- AC-17
800-53r4:
- AC-3
- CM-7
- CM-7(1)
- IA-2(8)
- IA-2(9)
srg:
- SRG-OS-000250-GPOS-00093
- SRG-OS-000033-GPOS-00014
- SRG-OS-000393-GPOS-00173
- SRG-OS-000394-GPOS-00174
- SRG-OS-000112-GPOS-00057
- SRG-OS-000113-GPOS-00058
- SRG-OS-000423-GPOS-00187
- SRG-OS-000424-GPOS-00188
- SRG-OS-000425-GPOS-00189
- SRG-OS-000426-GPOS-00190
disa_stig:
- APPL-11-000011
800-171r2:
- 3.1.1
- 3.1.2
- 3.4.6
- 3.5.4
macOS:
- "11.0"
tags:
- 800-53r5_low
- 800-53r5_moderate
- 800-53r5_high
- 800-53r4_low
- 800-53r4_moderate
- 800-53r4_high
- 800-171
- cnssi-1253
- stig
severity: "medium"
mobileconfig: false
mobileconfig_info: