STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to Apple macOS 12 (Monterey) Security Technical Implementation Guide

V-252478

CAT II (Medium)

The macOS system must require individuals to be authenticated with an individual authenticator prior to using a group authenticator.

Rule ID

SV-252478r982205_rule

STIG

Apple macOS 12 (Monterey) Security Technical Implementation Guide

Version

V1R9

CCIs

CCI-000770

Discussion

Administrator users must never log in directly as root. To assure individual accountability and prevent unauthorized access, logging in as root over a remote connection must be disabled. Administrators should only run commands as root after first authenticating with their individual user names and passwords.

Check Content

If SSH is not being used, this is Not Applicable.

To check if SSH has root logins enabled, run the following command:

/usr/bin/grep -r ^PermitRootLogin /etc/ssh/sshd_config*

If there is no result, or the result is set to "yes", this is a finding.
If conflicting results are returned, this is a finding.

Fix Text

To ensure that "PermitRootLogin" is disabled by sshd, run the following command:

/usr/bin/sudo /usr/bin/sed -i.bak 's/^[\#]*PermitRootLogin.*/PermitRootLogin no/' /etc/ssh/sshd_config