Files
macos_security/rules/auth/auth_ssh_smartcard_enforce.yaml
2020-09-10 17:28:46 -04:00

69 lines
1.8 KiB
YAML

id: auth_ssh_smartcard_enforce
title: "Enforce Smartcard Authentication for SSH"
discussion: |
Smartcard Authentication _MUST_ be enforced for user login via Secure Shell (SSH).
All users _MUST_ go through multifactor authentication to prevent unauthenticated access and potential compromise to the system.
NOTE: /etc/ssh/sshd_config will be automatically modified to its original state following any update or major upgrade to the operating system.
check: |
/usr/bin/grep -Ec '^(PasswordAuthentication\s+no|ChallengeResponseAuthentication\s+no)' /etc/ssh/sshd_config
result:
integer: 2
fix: |
The following commands must be run to disable passcode based authentication for SSHD:
[source,bash]
----
/usr/bin/sed -i.bak_$(date "+%Y-%m-%d_%H:%M") "s|#PasswordAuthentication yes|PasswordAuthentication no|; s|#ChallengeResponseAuthentication yes|ChallengeResponseAuthentication no|" /etc/ssh/sshd_config; /bin/launchctl kickstart -k system/com.openssh.sshd
----
references:
cce:
- CCE-84729-3
cci:
- CCI-000187
- CCI-000765
- CCI-000766
- CCI-000767
- CCI-000768
- CCI-000877
- CCI-001948
800-53r4:
- IA-2
- IA-2(1)
- IA-2(2)
- IA-2(3)
- IA-2(4)
- IA-2(6)
- IA-2(11)
- IA-5(2)
- MA-4
srg:
- SRG-OS-000068-GPOS-00036
- SRG-OS-000105-GPOS-00052
- SRG-OS-000106-GPOS-00053
- SRG-OS-000107-GPOS-00054
- SRG-OS-000108-GPOS-00055
- SRG-OS-000125-GPOS-00065
- SRG-OS-000375-GPOS-00160
disa_stig:
- AOSX-14-003020
- AOSX-14-003024
- AOSX-14-003005
- AOSX-14-003025
800-171r2:
- 3.5.1
- 3.5.2
- 3.5.3
- 3.7.5
macOS:
- "10.15"
tags:
- 800-171
- cnssi-1253
- fisma-low
- fisma-moderate
- fisma-high
- STIG
mobileconfig: false
mobileconfig_info: