Skip to content

Apple macOS 14 (Sonoma) Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • The macOS system must disable logon to other user's active and locked sessions.

    <VulnDiscussion>The ability to log in to another user's active or locked session must be disabled. macOS has a privilege that can be granted...
    Rule Medium Severity
  • SRG-OS-000104-GPOS-00051

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must disable root logon.

    &lt;VulnDiscussion&gt;To ensure individual accountability and prevent unauthorized access, logging in as root at the login window must be disabled....
    Rule Medium Severity
  • SRG-OS-000163-GPOS-00072

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must configure SSH ServerAliveInterval option set to 900.

    &lt;VulnDiscussion&gt;SSH must be configured with an Active Server Alive Maximum Count set to 900. Setting the Active Server Alive Maximum Count t...
    Rule Medium Severity
  • SRG-OS-000163-GPOS-00072

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must configure SSHD Channel Timeout to 900.

    &lt;VulnDiscussion&gt;If SSHD is enabled it must be configured with session Channel Timeout set to 900. This will set the time out when the sessio...
    Rule Medium Severity
  • SRG-OS-000163-GPOS-00072

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must configure SSHD unused connection timeout to 900.

    &lt;VulnDiscussion&gt;If SSHD is enabled, it must be configured with unused connection timeout set to 900. This will set the timeout when there ar...
    Rule Medium Severity
  • SRG-OS-000163-GPOS-00072

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must set SSH Active Server Alive Maximum to 0.

    &lt;VulnDiscussion&gt;SSH must be configured with an Active Server Alive Maximum Count set to 0. Terminating an idle session within a short time pe...
    Rule Medium Severity
  • SRG-OS-000279-GPOS-00109

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must enforce auto logout after 86400 seconds of inactivity.

    &lt;VulnDiscussion&gt;Auto logout must be configured to automatically terminate a user session and log out the after 86400 seconds of inactivity. ...
    Rule Medium Severity
  • SRG-OS-000355-GPOS-00143

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must be configured to use an authorized time server.

    &lt;VulnDiscussion&gt;Approved time servers must be the only servers configured for use. This rule ensures the uniformity of time stamps for infor...
    Rule Medium Severity
  • SRG-OS-000355-GPOS-00143

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must enable time synchronization daemon.

    &lt;VulnDiscussion&gt;The macOS time synchronization daemon (timed) must be enabled for proper time synchronization to an authorized time server. ...
    Rule Medium Severity
  • SRG-OS-000004-GPOS-00004

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must be configured to audit all administrative action events.

    &lt;VulnDiscussion&gt;Administrative action events include changes made to the system (e.g., modifying authentication policies). If audit records d...
    Rule Medium Severity
  • SRG-OS-000032-GPOS-00013

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must be configured to audit all log on and log out events.

    &lt;VulnDiscussion&gt;The audit system must be configured to record all attempts to log in and out of the system (lo). Frequently, an attacker tha...
    Rule Medium Severity
  • SRG-OS-000037-GPOS-00015

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must enable security auditing.

    &lt;VulnDiscussion&gt;Audit records establish what types of events have occurred, when they occurred, and which users were involved. These records ...
    Rule Medium Severity
  • SRG-OS-000047-GPOS-00023

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must configure system to shut down upon audit failure.

    &lt;VulnDiscussion&gt;The audit service must be configured to shut down the computer if it is unable to audit system events. Once audit failure oc...
    Rule Medium Severity
  • SRG-OS-000057-GPOS-00027

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must configure audit log files to be owned by root.

    &lt;VulnDiscussion&gt;Audit log files must be owned by root. The audit service must be configured to create log files with the correct ownership t...
    Rule Medium Severity
  • SRG-OS-000057-GPOS-00027

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must configure audit log folders to be owned by root.

    &lt;VulnDiscussion&gt;Audit log folders must be owned by root. The audit service must be configured to create log folders with the correct ownersh...
    Rule Medium Severity
  • SRG-OS-000057-GPOS-00027

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must configure audit log files group to wheel.

    &lt;VulnDiscussion&gt;Audit log files must have the group set to wheel. The audit service must be configured to create log files with the correct ...
    Rule Medium Severity
  • SRG-OS-000057-GPOS-00027

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must configure audit failure notification.

    &lt;VulnDiscussion&gt;The audit service must be configured to immediately print messages to the console or email administrator users when an auditi...
    Rule Medium Severity
  • The macOS system must configure audit log folders group to wheel.

    &lt;VulnDiscussion&gt;Audit log folders must have the group set to wheel. The audit service must be configured to create log files with the correc...
    Rule Medium Severity
  • SRG-OS-000057-GPOS-00027

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must configure audit log files to mode 440 or less permissive.

    &lt;VulnDiscussion&gt;The audit service must be configured to create log files that are readable only by the root user and group wheel. To achieve ...
    Rule Medium Severity
  • SRG-OS-000057-GPOS-00027

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must configure audit log folders to mode 700 or less permissive.

    &lt;VulnDiscussion&gt;The audit log folder must be configured to mode 700 or less permissive so that only the root user is able to read, write, and...
    Rule Medium Severity
  • SRG-OS-000057-GPOS-00027

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must be configured to audit all deletions of object attributes.

    &lt;VulnDiscussion&gt;The audit system must be configured to record enforcement actions of attempts to delete file attributes (fd). ***Enforcement...
    Rule Medium Severity
  • SRG-OS-000057-GPOS-00027

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must be configured to audit all changes of object attributes.

    &lt;VulnDiscussion&gt;The audit system must be configured to record enforcement actions of attempts to modify file attributes (fm). Enforcement ac...
    Rule Medium Severity
  • SRG-OS-000463-GPOS-00207

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must be configured to audit all failed read actions on the system.

    &lt;VulnDiscussion&gt;The audit system must be configured to record enforcement actions of access restrictions, including failed file read (-fr) at...
    Rule Medium Severity
  • SRG-OS-000463-GPOS-00207

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must be configured to audit all failed write actions on the system.

    &lt;VulnDiscussion&gt;The audit system must be configured to record enforcement actions of access restrictions, including failed file write (-fw) a...
    Rule Medium Severity
  • SRG-OS-000463-GPOS-00207

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must be configured to audit all failed program execution on the system.

    &lt;VulnDiscussion&gt;The audit system must be configured to record enforcement actions of access restrictions, including failed program execute (-...
    Rule Medium Severity
  • SRG-OS-000341-GPOS-00132

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must configure audit retention to seven days.

    &lt;VulnDiscussion&gt;The audit service must be configured to require records be kept for an organizational defined value before deletion, unless t...
    Rule Low Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules