Skip to content

Apple macOS 15 (Sequoia) Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must configure audit failure notification.

    &lt;VulnDiscussion&gt;The audit service must be configured to immediately print messages to the console or email administrator users when an auditi...
    Rule Medium Severity
  • SRG-OS-000365-GPOS-00152

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must be configured to audit all authorization and authentication events.

    &lt;VulnDiscussion&gt;The auditing system must be configured to flag authorization and authentication (aa) events. Authentication events contain i...
    Rule Medium Severity
  • SRG-OS-000066-GPOS-00034

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must set smart card certificate trust to moderate.

    &lt;VulnDiscussion&gt;The macOS system must be configured to block access to users who are no longer authorized (i.e., users with revoked certifica...
    Rule Medium Severity
  • SRG-OS-000109-GPOS-00056

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must disable root login for SSH.

    &lt;VulnDiscussion&gt;If SSH is enabled to ensure individual accountability and prevent unauthorized access, logging in as root via SSH must be dis...
    Rule Medium Severity
  • SRG-OS-000057-GPOS-00027

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must configure audit_control group to wheel.

    &lt;VulnDiscussion&gt;/etc/security/audit_control must have the group set to wheel. The audit service must be configured with the correct group ow...
    Rule Medium Severity
  • SRG-OS-000057-GPOS-00027

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must configure audit_control owner to root.

    &lt;VulnDiscussion&gt;/etc/security/audit_control must have the owner set to root. The audit service must be configured with the correct ownership...
    Rule Medium Severity
  • SRG-OS-000057-GPOS-00027

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must configure audit_control owner to mode 440 or less permissive.

    &lt;VulnDiscussion&gt;/etc/security/audit_control must be configured so that it is readable only by the root user and group wheel. The audit servi...
    Rule Medium Severity
  • SRG-OS-000067-GPOS-00035

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must disable password authentication for SSH.

    &lt;VulnDiscussion&gt;If remote login through SSH is enabled, password-based authentication must be disabled for user login. All users must go thr...
    Rule High Severity
  • SRG-OS-000080-GPOS-00048

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must disable Server Message Block (SMB) sharing.

    &lt;VulnDiscussion&gt;Support for SMB file sharing is nonessential and must be disabled. The information system must be configured to provide only...
    Rule Medium Severity
  • SRG-OS-000080-GPOS-00048

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must disable Network File System (NFS) service.

    &lt;VulnDiscussion&gt;Support for NFS services is nonessential and, therefore, must be disabled. Enabling any service increases the attack surface ...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules