Skip to content

Apple macOS 15 (Sequoia) Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-OS-000028-GPOS-00009

    Group
  • The macOS system must prevent Apple Watch from terminating a session lock.

    Apple Watches are not an approved authenticator and their use must be disabled. Disabling Apple Watches is a necessary step to ensuring that the information system retains a session lock until the...
    Rule Medium Severity
  • SRG-OS-000028-GPOS-00009

    Group
  • The macOS system must enforce screen saver password.

    Users must authenticate when unlocking the screen saver. The screen saver acts as a session lock and prevents unauthorized users from accessing the current user's account.
    Rule Medium Severity
  • SRG-OS-000028-GPOS-00009

    Group
  • The macOS system must enforce session lock no more than five seconds after screen saver is started.

    A screen saver must be enabled and the system must be configured to require a password to unlock once the screen saver has been on for a maximum of five seconds. An unattended system with an exces...
    Rule Medium Severity
  • SRG-OS-000030-GPOS-00011

    Group
  • SRG-OS-000031-GPOS-00012

    Group
  • SRG-OS-000031-GPOS-00012

    Group
  • The macOS system must prevent AdminHostInfo from being available at LoginWindow.

    The system must be configured to not display sensitive information at the LoginWindow. The key AdminHostInfo, when configured, will allow the HostName, IP Address, and operating system version and ...
    Rule Medium Severity
  • SRG-OS-000002-GPOS-00002

    Group
  • SRG-OS-000355-GPOS-00143

    Group
  • The macOS system must enforce time synchronization.

    Time synchronization must be enforced on all networked systems. This rule ensures the uniformity of time stamps for information systems with multiple system clocks and systems connected over a net...
    Rule Medium Severity
  • SRG-OS-000021-GPOS-00005

    Group
  • The macOS system must limit consecutive failed login attempts to three.

    The macOS must be configured to limit the number of failed login attempts to a maximum of three. When the maximum number of failed attempts is reached, the account must be locked for a period of ti...
    Rule Medium Severity
  • SRG-OS-000023-GPOS-00006

    Group
  • The macOS system must display a policy banner at remote login.

    Remote login service must be configured to display a policy banner at login. Displaying a standardized and approved use notification before granting access to the operating system ensures that use...
    Rule Medium Severity
  • SRG-OS-000023-GPOS-00006

    Group
  • SRG-OS-000057-GPOS-00027

    Group
  • The macOS system must configure audit log files to not contain access control lists (ACLs).

    The audit log files must not contain ACLs. This rule ensures that audit information and audit files are configured to be readable and writable only by system administrators, thereby preventing una...
    Rule Medium Severity
  • SRG-OS-000057-GPOS-00027

    Group
  • The macOS system must configure the audit log folder to not contain access control lists (ACLs).

    The audit log folder must not contain ACLs. Audit logs contain sensitive data about the system and users. This rule ensures that the audit service is configured to create log folders that are read...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    Group
  • SRG-OS-000163-GPOS-00072

    Group
  • The macOS system must configure SSHD ClientAliveInterval to 900.

    If SSHD is enabled, it must be configured with the Client Alive Interval set to 900. This sets a timeout interval in seconds, after which if no data has been received from the client, sshd(8) will...
    Rule Medium Severity
  • SRG-OS-000163-GPOS-00072

    Group
  • SRG-OS-000163-GPOS-00072

    Group
  • SRG-OS-000033-GPOS-00014

    Group
  • SRG-OS-000033-GPOS-00014

    Group
  • The macOS system must limit SSH to FIPS-compliant connections.

    SSH must be configured to limit the Ciphers, HostbasedAcceptedAlgorithms, HostKeyAlgorithms, KexAlgorithms, MACs, PubkeyAcceptedAlgorithms, CASignatureAlgorithms to algorithms that are FIPS-140 val...
    Rule High Severity
  • SRG-OS-000021-GPOS-00005

    Group
  • SRG-OS-000029-GPOS-00010

    Group
  • The macOS system must enforce screen saver timeout.

    The screen saver timeout must be set to 900 seconds or a shorter length of time. This rule ensures that a full session lock is triggered within no more than 900 seconds of inactivity.
    Rule Medium Severity
  • SRG-OS-000104-GPOS-00051

    Group
  • SRG-OS-000104-GPOS-00051

    Group
  • The macOS system must disable root login.

    To assure individual accountability and prevent unauthorized access, logging in as root at the login window must be disabled. The macOS system must require individuals to be authenticated with an ...
    Rule Medium Severity
  • SRG-OS-000163-GPOS-00072

    Group
  • SRG-OS-000163-GPOS-00072

    Group
  • The macOS system must configure SSHD channel timeout to 900.

    If SSHD is enabled, it must be configured with session ChannelTimeout set to 900. This will set the timeout when the session is inactive. NOTE: /etc/ssh/sshd_config will be automatically modified...
    Rule Medium Severity
  • SRG-OS-000163-GPOS-00072

    Group
  • The macOS system must configure SSHD unused connection timeout to 900.

    If SSHD is enabled, it must be configured with unused connection timeout set to 900. This will set the timeout when there are no open channels within a session. NOTE: /etc/ssh/sshd_config will be...
    Rule Medium Severity
  • SRG-OS-000163-GPOS-00072

    Group
  • SRG-OS-000279-GPOS-00109

    Group
  • The macOS system must enforce auto logout after 86400 seconds of inactivity.

    Auto logout must be configured to automatically terminate a user session and log out after 86400 seconds of inactivity. NOTE: The maximum that macOS can be configured for autologoff is 86400 secon...
    Rule Medium Severity
  • SRG-OS-000355-GPOS-00143

    Group
  • SRG-OS-000355-GPOS-00143

    Group
  • SRG-OS-000064-GPOS-00033

    Group
  • The macOS system must configure sudo to log events.

    Sudo must be configured to log privilege escalation. Without logging privilege escalation, it is difficult to identify attempted attacks because no audit trail is available for forensic investigat...
    Rule Medium Severity
  • SRG-OS-000004-GPOS-00004

    Group
  • SRG-OS-000032-GPOS-00013

    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules