Skip to content
macOSSystemHigh

TCC Database

Transparency, Consent, and Control SQLite database recording which applications were granted access to camera, microphone, contacts, photos, screen recording, and full-disk access.

artifact_type: macos_tcc_db

Where to find it

Default filesystem paths and registry locations. Collect these with your preferred live-response or disk-image tooling.

  • $/Library/Application Support/com.apple.TCC/TCC.db
  • $~/Library/Application Support/com.apple.TCC/TCC.db

Forensic significance

Common scenarios in which this artifact becomes decisive evidence.

  • Identifying apps with microphone/camera access before a leak
  • Malware granted unusual privacy permissions
  • Supply-chain attack — third-party app with FDA privilege

MITRE ATT&CK mapping

Techniques this artifact can help detect or substantiate. Click a technique to view the official MITRE entry.

Tools that parse it

unJaena AI and other DFIR tools commonly used to extract evidence from this artifact.

unJaena AI
mac_apt
APOLLO
tccutil

Related artifacts

Stop parsing artifacts by hand

unJaena AI ingests disk images, live-response output, and mobile backups, then automatically correlates every artifact on this page — and 200+ more — into an investigator-ready timeline.

Try unJaena AI