Apple macOS 13 (Ventura) Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-OS-000064-GPOS-00033
<GroupDescription></GroupDescription>Group -
The macOS system must audit the enforcement actions used to restrict access associated with changes to the system.
<VulnDiscussion>By auditing access restriction enforcement, changes to application and OS configuration files can be audited. Without auditin...Rule Medium Severity -
SRG-OS-000341-GPOS-00132
<GroupDescription></GroupDescription>Group -
The macOS system must allocate audit record storage capacity to store at least seven days of audit records when audit records are not immediately sent to a central audit record storage facility.
<VulnDiscussion>The audit service must be configured to require that records are kept for seven days or longer before deletion when there is ...Rule Low Severity -
SRG-OS-000343-GPOS-00134
<GroupDescription></GroupDescription>Group -
The macOS system must provide an immediate warning to the System Administrator (SA) and Information System Security Officer (ISSO) (at a minimum) when allocated audit record storage volume reaches 75 percent of repository maximum audit record storage capacity.
<VulnDiscussion>The audit service must be configured to require a minimum percentage of free disk space to run. This ensures that audit will ...Rule Low Severity -
SRG-OS-000344-GPOS-00135
<GroupDescription></GroupDescription>Group -
The macOS system must provide an immediate real-time alert to the System Administrator (SA) and Information System Security Officer (ISSO), at a minimum, of all audit failure events requiring real-time alerts.
<VulnDiscussion>The audit service must be configured to immediately print messages to the console or email administrator users when an auditi...Rule Medium Severity -
SRG-OS-000470-GPOS-00214
<GroupDescription></GroupDescription>Group -
The macOS system must generate audit records for DOD-defined events such as successful/unsuccessful logon attempts, successful/unsuccessful direct access attempts, starting and ending time for user access, and concurrent logons to the same account from different sources.
<VulnDiscussion>Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...Rule Medium Severity -
SRG-OS-000067-GPOS-00035
<GroupDescription></GroupDescription>Group -
The macOS system must accept and verify Personal Identity Verification (PIV) credentials, implement a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network, and only allow the use of DOD PKI-established certificate authorities for verification of the establishment of protected sessions.
<VulnDiscussion>The use of PIV credentials facilitates standardization and reduces the risk of unauthorized access. Without configuring a lo...Rule Medium Severity -
SRG-OS-000109-GPOS-00056
<GroupDescription></GroupDescription>Group -
The macOS system must require individuals to be authenticated with an individual authenticator prior to using a group authenticator.
<VulnDiscussion>Administrator users must never log in directly as root. To assure individual accountability and prevent unauthorized access, ...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
The macOS system must be configured to disable SMB File Sharing unless it is required.
<VulnDiscussion>File sharing is usually nonessential and must be disabled if not required. Enabling any service increases the attack surface ...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
The macOS system must be configured to disable the Network File System (NFS) daemon unless it is required.
<VulnDiscussion>If the system does not require access to NFS file shares or is not acting as an NFS server, support for NFS is nonessential a...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
The macOS system must be configured to disable Location Services.
<VulnDiscussion>To prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embeddi...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.