The macOS system must configure sudo to log events.

Severity
Group ID
Group Title
Version
Rule ID
Date
STIG Version
mediumV-268451SRG-OS-000064-GPOS-00033APPL-15-000190SV-268451r1034293_rule2025-02-201
Description
Sudo must be configured to log privilege escalation. Without logging privilege escalation, it is difficult to identify attempted attacks because no audit trail is available for forensic investigation.
ℹ️ Check
Verify the macOS system is configured to log privilege escalation with the following command: /usr/bin/sudo /usr/bin/sudo -V | /usr/bin/grep -c "Log when a command is allowed by sudoers" If the result is not "1", this is a finding.
✔️ Fix
Configure the macOS system to log privilege escalation with the following command: /usr/bin/find /etc/sudoers* -type f -exec sed -i '' '/Defaults \!log_allowed/d' '{}' \; /bin/echo "Defaults log_allowed" >> /etc/sudoers.d/mscp