Apple macOS 13 (Ventura) Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-OS-000379-GPOS-00164
<GroupDescription></GroupDescription>Group -
The macOS system must be configured with Bluetooth turned off unless approved by the organization.
<VulnDiscussion>Without protection of communications with wireless peripherals, confidentiality and integrity may be compromised because unpr...Rule Low Severity -
SRG-OS-000364-GPOS-00151
<GroupDescription></GroupDescription>Group -
The macOS system must disable the guest account.
<VulnDiscussion>Failure to provide logical access restrictions associated with changes to system configuration may have significant effects o...Rule High Severity -
SRG-OS-000366-GPOS-00153
<GroupDescription></GroupDescription>Group -
The macOS system must have the security assessment policy subsystem enabled.
<VulnDiscussion>Any changes to the hardware, software, and/or firmware components of the information system and/or application can potentiall...Rule High Severity -
SRG-OS-000480-GPOS-00229
<GroupDescription></GroupDescription>Group -
The macOS system must not allow an unattended or automatic logon to the system.
<VulnDiscussion>Failure to restrict system access to authenticated users negatively impacts operating system security.</VulnDiscussion>...Rule Medium Severity -
SRG-OS-000480-GPOS-00228
<GroupDescription></GroupDescription>Group -
The macOS system must set permissions on user home directories to prevent users from having access to read or modify another user's files.
<VulnDiscussion>Configuring the operating system to use the most restrictive permissions possible for user home directories helps to protect ...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The macOS system must use an approved antivirus program.
<VulnDiscussion>An approved antivirus product must be installed and configured to run. Malicious software can establish a base on individual...Rule High Severity -
SRG-OS-000066-GPOS-00034
<GroupDescription></GroupDescription>Group -
The macOS system must issue or obtain public key certificates under an appropriate certificate policy from an approved service provider.
<VulnDiscussion>DOD-approved certificates must be installed to the System Keychain so they will be available to all users. For user certific...Rule High Severity -
SRG-OS-000071-GPOS-00039
<GroupDescription></GroupDescription>Group -
The macOS system must enforce password complexity by requiring that at least one numeric character be used.
<VulnDiscussion>Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...Rule Medium Severity -
SRG-OS-000076-GPOS-00044
<GroupDescription></GroupDescription>Group -
The macOS system must enforce a 60-day maximum password lifetime restriction.
<VulnDiscussion>Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed periodically. One me...Rule Medium Severity -
SRG-OS-000077-GPOS-00045
<GroupDescription></GroupDescription>Group -
The macOS system must prohibit password reuse for a minimum of five generations.
<VulnDiscussion>Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute...Rule Medium Severity -
SRG-OS-000078-GPOS-00046
<GroupDescription></GroupDescription>Group -
The macOS system must enforce a minimum 15-character password length.
<VulnDiscussion>The minimum password length must be set to 15 characters. Password complexity, or strength, is a measure of the effectiveness...Rule Medium Severity -
SRG-OS-000266-GPOS-00101
<GroupDescription></GroupDescription>Group -
The macOS system must enforce password complexity by requiring that at least one special character be used.
<VulnDiscussion>Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity o...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The macOS system must be configured to prevent displaying password hints.
<VulnDiscussion>Password hints leak information about passwords in use and can lead to loss of confidentiality.</VulnDiscussion><Fal...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The macOS system must be configured with a firmware password to prevent access to single user mode and booting from alternative media.
<VulnDiscussion>Single user mode and the boot picker, as well as numerous other tools, are available on macOS through booting while holding t...Rule Medium Severity -
SRG-OS-000068-GPOS-00036
<GroupDescription></GroupDescription>Group -
The macOS system must use multifactor authentication for local access to privileged and nonprivileged accounts.
<VulnDiscussion>Without the use of multifactor authentication, the ease of access to privileged and nonprivileged functions is greatly increa...Rule High Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The macOS system must be configured so that the login command requires smart card authentication.
<VulnDiscussion>Configuring the operating system to implement organization-wide security implementation guides and security checklists ensure...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The macOS system must be configured so that the su command requires smart card authentication.
<VulnDiscussion>Configuring the operating system to implement organization-wide security implementation guides and security checklists ensure...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The macOS system must be configured so that the sudo command requires smart card authentication.
<VulnDiscussion>Configuring the operating system to implement organization-wide security implementation guides and security checklists ensure...Rule Medium Severity -
SRG-OS-000206-GPOS-00084
<GroupDescription></GroupDescription>Group -
The macOS system must be configured with system log files owned by root and group-owned by wheel or admin.
<VulnDiscussion>System logs must only be readable by root or admin users. System logs frequently contain sensitive information that could be ...Rule Medium Severity -
SRG-OS-000206-GPOS-00084
<GroupDescription></GroupDescription>Group -
The macOS system must be configured with system log files set to mode 640 or less permissive.
<VulnDiscussion>System logs must only be readable by root or admin users. System logs frequently contain sensitive information that could be ...Rule Medium Severity -
SRG-OS-000373-GPOS-00156
<GroupDescription></GroupDescription>Group -
The macOS system must require users to reauthenticate for privilege escalation when using the "sudo" command.
<VulnDiscussion>Without reauthentication, users may access resources or perform tasks for which they do not have authorization. When operat...Rule Medium Severity -
SRG-OS-000051-GPOS-00024
<GroupDescription></GroupDescription>Group -
The macOS system must enable System Integrity Protection.
<VulnDiscussion>System Integrity Protection (SIP) is vital to the protection of the integrity of macOS. SIP restricts what actions can be per...Rule High Severity -
SRG-OS-000185-GPOS-00079
<GroupDescription></GroupDescription>Group -
The macOS system must implement cryptographic mechanisms to protect the confidentiality and integrity of all information at rest.
<VulnDiscussion>Information at rest refers to the state of information when it is located on a secondary storage device (e.g., disk drive and...Rule High Severity -
SRG-OS-000480-GPOS-00232
<GroupDescription></GroupDescription>Group -
The macOS Application Firewall must be enabled.
<VulnDiscussion>Firewalls protect computers from network attacks by blocking or limiting access to open network ports. Application firewalls ...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The macOS system must restrict the ability of individuals to use USB storage devices.
<VulnDiscussion>External writeable media devices must be disabled for users. External USB devices are a potential vector for malware and can ...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.