The operating system must employ automated mechanisms, per organization-defined frequency, to detect the addition of unauthorized components/devices into the operating system.

Severity
Group ID
Group Title
Version
Rule ID
Date
STIG Version
mediumV-219970SRG-OS-000363SOL-11.1-020190SV-219970r958794_rule2024-11-253
Description
Addition of unauthorized code or packages may result in data corruption or theft.
ℹ️ Check
The Software Installation Profile is required. Display the installation history of packages on the system to ensure that no undesirable packages have been installed: # pkg history -o finish,user,operation,command |grep install If the install command is listed as "/usr/bin/packagemanager", execute the command: # pkg history -l to determine which packages were installed during package manager sessions. If undocumented or unapproved packages have been installed, this is a finding.
✔️ Fix
The Software Installation Profile is required. Review and report any unauthorized package installation operations. If necessary, remove unauthorized packages. # pfexec pkg uninstall [package name]