Skip to content

Apple macOS 15 (Sequoia) Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must configure audit failure notification.

    &lt;VulnDiscussion&gt;The audit service must be configured to immediately print messages to the console or email administrator users when an auditi...
    Rule Medium Severity
  • SRG-OS-000365-GPOS-00152

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must be configured to audit all authorization and authentication events.

    &lt;VulnDiscussion&gt;The auditing system must be configured to flag authorization and authentication (aa) events. Authentication events contain i...
    Rule Medium Severity
  • SRG-OS-000066-GPOS-00034

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must set smart card certificate trust to moderate.

    &lt;VulnDiscussion&gt;The macOS system must be configured to block access to users who are no longer authorized (i.e., users with revoked certifica...
    Rule Medium Severity
  • SRG-OS-000109-GPOS-00056

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must disable root login for SSH.

    &lt;VulnDiscussion&gt;If SSH is enabled to ensure individual accountability and prevent unauthorized access, logging in as root via SSH must be dis...
    Rule Medium Severity
  • SRG-OS-000057-GPOS-00027

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must configure audit_control group to wheel.

    &lt;VulnDiscussion&gt;/etc/security/audit_control must have the group set to wheel. The audit service must be configured with the correct group ow...
    Rule Medium Severity
  • SRG-OS-000057-GPOS-00027

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must configure audit_control owner to root.

    &lt;VulnDiscussion&gt;/etc/security/audit_control must have the owner set to root. The audit service must be configured with the correct ownership...
    Rule Medium Severity
  • SRG-OS-000057-GPOS-00027

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must configure audit_control owner to mode 440 or less permissive.

    &lt;VulnDiscussion&gt;/etc/security/audit_control must be configured so that it is readable only by the root user and group wheel. The audit servi...
    Rule Medium Severity
  • SRG-OS-000067-GPOS-00035

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must disable password authentication for SSH.

    &lt;VulnDiscussion&gt;If remote login through SSH is enabled, password-based authentication must be disabled for user login. All users must go thr...
    Rule High Severity
  • SRG-OS-000080-GPOS-00048

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must disable Server Message Block (SMB) sharing.

    &lt;VulnDiscussion&gt;Support for SMB file sharing is nonessential and must be disabled. The information system must be configured to provide only...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must disable Network File System (NFS) service.

    &lt;VulnDiscussion&gt;Support for NFS services is nonessential and, therefore, must be disabled. Enabling any service increases the attack surface ...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must disable Location Services.

    &lt;VulnDiscussion&gt;Location Services must be disabled. The information system must be configured to provide only essential capabilities. Disabl...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must disable Unix-to-Unix Copy Protocol (UUCP) service.

    &lt;VulnDiscussion&gt;The system must not have the UUCP service active. UUCP, a set of programs that enables sending files between different Unix ...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must disable Internet Sharing.

    &lt;VulnDiscussion&gt;If the system does not require Internet Sharing, support for it is nonessential and must be disabled. The information system...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must disable the built-in web server.

    &lt;VulnDiscussion&gt;The built-in web server is a nonessential service built into macOS and must be disabled. NOTE: The built-in web server is di...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must disable AirDrop.

    &lt;VulnDiscussion&gt;AirDrop must be disabled to prevent file transfers to or from unauthorized devices. AirDrop allows users to share and receiv...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must disable FaceTime.app.

    &lt;VulnDiscussion&gt;The macOS built-in FaceTime.app must be disabled. The FaceTime.app establishes a connection to Apple's iCloud service even w...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must disable the iCloud Calendar services.

    &lt;VulnDiscussion&gt;The macOS built-in Calendar.app connection to Apple's iCloud service must be disabled. Apple's iCloud service does not provi...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must disable password hints.

    &lt;VulnDiscussion&gt;Password hints must be disabled. Password hints leak information about passwords that are currently in use and can lead to l...
    Rule Medium Severity
  • SRG-OS-000480-GPOS-00227

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must disable iCloud Reminders.

    &lt;VulnDiscussion&gt;The macOS built-in Reminders.app connection to Apple's iCloud service must be disabled. Apple's iCloud service does not prov...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must disable iCloud Address Book.

    &lt;VulnDiscussion&gt;The macOS built-in Contacts.app connection to Apple's iCloud service must be disabled. Apple's iCloud service does not provi...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must disable iCloud Mail.

    &lt;VulnDiscussion&gt;The macOS built-in Mail.app connection to Apple's iCloud service must be disabled. Apple's iCloud service does not provide a...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must disable iCloud Notes.

    &lt;VulnDiscussion&gt;The macOS built-in Notes.app connection to Apple's iCloud service must be disabled. Apple's iCloud service does not provide ...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must disable the camera.

    &lt;VulnDiscussion&gt;It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission ob...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must disable Siri.

    &lt;VulnDiscussion&gt;Support for Siri is nonessential and must be disabled. The information system must be configured to provide only essential c...
    Rule Medium Severity
  • SRG-OS-000205-GPOS-00083

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must disable sending diagnostic and usage data to Apple.

    &lt;VulnDiscussion&gt;The ability to submit diagnostic data to Apple must be disabled. The information system must be configured to provide only e...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules