From Apple OS X 10.12 Security Technical Implementation Guide
Part of SRG-OS-000362-GPOS-00149
Associated with: CCI-001812
Allowing regular users to install software, without explicit privileges, creates the risk that untested or potentially malicious software will be installed on the system. Explicit privileges (escalated or administrative privileges) provide the regular user with explicit capabilities and control that exceeds the rights of a regular user.
To check if the system is configured to prohibit user installation of software, first check to ensure the Parental Controls are enabled with the following command:
/usr/sbin/system_profiler SPConfigurationProfileDataType | /usr/bin/grep "familyControlsEnabled = 1;"
If there is no result, this is a finding.
Next, check that a blacklist has been properly configured for the user's home directories with the following command:
/usr/sbin/system_profiler –xml SPConfigurationProfileDataType | /usr/bin/sed -n '/pathBlackList/,/key/p' | /usr/bin/grep "
This setting is enforced using the "Application Restrictions Policy" configuration profile.
Lavender hyperlinks in small type off to the right (of CSS
class id
, if you view the page source) point to
globally unique URIs for each document and item. Copy the
link location and paste anywhere you need to talk
unambiguously about these things.
You can obtain data about documents and items in other
formats. Simply provide an HTTP header Accept:
text/turtle
or
Accept: application/rdf+xml
.
Powered by sagemincer