STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to Apple macOS 13 (Ventura) Security Technical Implementation Guide

V-257184

CAT II (Medium)

The macOS system must require individuals to be authenticated with an individual authenticator prior to using a group authenticator.

Rule ID

SV-257184r982205_rule

STIG

Apple macOS 13 (Ventura) Security Technical Implementation Guide

Version

V1R5

CCIs

CCI-000770

Discussion

Administrator users must never log in directly as root. To assure individual accountability and prevent unauthorized access, logging in as root over a remote connection must be disabled. Administrators must only run commands as root after first authenticating with their individual usernames and passwords.

Check Content

If SSH is not being used, this is not applicable.

Verify the macOS system is configured to disable root logins over SSH with the following command:

/usr/bin/grep -r ^PermitRootLogin /etc/ssh/sshd_config*

If there is no result, or the result is set to "yes", this is a finding.

If conflicting results are returned, this is a finding.

Fix Text

Configure the macOS system to disable root logins over SSH with the following command:

/usr/bin/sudo /usr/bin/sed -i.bak 's/^[\#]*PermitRootLogin.*/PermitRootLogin no/' /etc/ssh/sshd_config