Apple macOS 15 (Sequoia) Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
The macOS system must disable Bonjour multicast.
<VulnDiscussion>Bonjour multicast advertising must be disabled to prevent the system from broadcasting its presence and available services ov...Rule Medium Severity -
SRG-OS-000080-GPOS-00048
<GroupDescription></GroupDescription>Group -
The macOS system must disable iCloud Private Relay.
<VulnDiscussion>Enterprise networks may be required to audit all network traffic by policy; therefore, iCloud Private Relay must be disabled....Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
SRG-OS-000028-GPOS-00009
<GroupDescription></GroupDescription>Group -
The macOS system must prevent Apple Watch from terminating a session lock.
<VulnDiscussion>Apple Watches are not an approved authenticator and their use must be disabled. Disabling Apple Watches is a necessary step ...Rule Medium Severity -
SRG-OS-000028-GPOS-00009
<GroupDescription></GroupDescription>Group -
The macOS system must enforce screen saver password.
<VulnDiscussion>Users must authenticate when unlocking the screen saver. The screen saver acts as a session lock and prevents unauthorized u...Rule Medium Severity -
SRG-OS-000028-GPOS-00009
<GroupDescription></GroupDescription>Group -
The macOS system must enforce session lock no more than five seconds after screen saver is started.
<VulnDiscussion>A screen saver must be enabled and the system must be configured to require a password to unlock once the screen saver has be...Rule Medium Severity -
SRG-OS-000030-GPOS-00011
<GroupDescription></GroupDescription>Group -
The macOS system must configure user session lock when a smart token is removed.
<VulnDiscussion>The screen lock must be configured to initiate automatically when the smart token is removed from the system. Session locks ...Rule Medium Severity -
SRG-OS-000031-GPOS-00012
<GroupDescription></GroupDescription>Group -
The macOS system must disable hot corners.
<VulnDiscussion>Hot corners must be disabled. The information system conceals, via the session lock, information previously visible on the d...Rule Medium Severity -
SRG-OS-000031-GPOS-00012
<GroupDescription></GroupDescription>Group -
The macOS system must prevent AdminHostInfo from being available at LoginWindow.
<VulnDiscussion>The system must be configured to not display sensitive information at the LoginWindow. The key AdminHostInfo, when configured...Rule Medium Severity -
SRG-OS-000002-GPOS-00002
<GroupDescription></GroupDescription>Group -
The macOS system must automatically remove or disable temporary or emergency user accounts within 72 hours.
<VulnDiscussion>The macOS system can be configured to set an automated termination for 72 hours or less for all temporary or emergency accoun...Rule Medium Severity -
SRG-OS-000355-GPOS-00143
<GroupDescription></GroupDescription>Group -
The macOS system must enforce time synchronization.
<VulnDiscussion>Time synchronization must be enforced on all networked systems. This rule ensures the uniformity of time stamps for informat...Rule Medium Severity -
SRG-OS-000021-GPOS-00005
<GroupDescription></GroupDescription>Group -
The macOS system must limit consecutive failed login attempts to three.
<VulnDiscussion>The macOS must be configured to limit the number of failed login attempts to a maximum of three. When the maximum number of f...Rule Medium Severity -
SRG-OS-000023-GPOS-00006
<GroupDescription></GroupDescription>Group -
The macOS system must display a policy banner at remote login.
<VulnDiscussion>Remote login service must be configured to display a policy banner at login. Displaying a standardized and approved use noti...Rule Medium Severity -
SRG-OS-000023-GPOS-00006
<GroupDescription></GroupDescription>Group -
The macOS system must display the Standard Mandatory DOD Notice and Consent Banner at the login window.
<VulnDiscussion>Displaying a standardized and approved use notification before granting access to the operating system ensures that users are...Rule Medium Severity -
SRG-OS-000057-GPOS-00027
<GroupDescription></GroupDescription>Group -
The macOS system must configure audit log files to not contain access control lists (ACLs).
<VulnDiscussion>The audit log files must not contain ACLs. This rule ensures that audit information and audit files are configured to be rea...Rule Medium Severity -
SRG-OS-000057-GPOS-00027
<GroupDescription></GroupDescription>Group -
The macOS system must configure the audit log folder to not contain access control lists (ACLs).
<VulnDiscussion>The audit log folder must not contain ACLs. Audit logs contain sensitive data about the system and users. This rule ensures ...Rule Medium Severity -
SRG-OS-000080-GPOS-00048
<GroupDescription></GroupDescription>Group -
The macOS system must disable FileVault automatic login.
<VulnDiscussion>If FileVault is enabled, automatic login must be disabled so that both FileVault and login window authentication are required...Rule Medium Severity -
SRG-OS-000163-GPOS-00072
<GroupDescription></GroupDescription>Group -
SRG-OS-000021-GPOS-00005
<GroupDescription></GroupDescription>Group -
The macOS system must configure SSHD ClientAliveInterval to 900.
<VulnDiscussion>If SSHD is enabled, it must be configured with the Client Alive Interval set to 900. This sets a timeout interval in seconds...Rule Medium Severity -
SRG-OS-000163-GPOS-00072
<GroupDescription></GroupDescription>Group -
The macOS system must configure SSHD ClientAliveCountMax to 1.
<VulnDiscussion>If SSHD is enabled, it must be configured with the Client Alive Maximum Count set to 1. This will set the number of client a...Rule Medium Severity -
SRG-OS-000163-GPOS-00072
<GroupDescription></GroupDescription>Group -
The macOS system must set login grace time to 30.
<VulnDiscussion>If SSHD is enabled, it must be configured to wait only 30 seconds before timing out login attempts. NOTE: /etc/ssh/sshd_conf...Rule Medium Severity -
SRG-OS-000033-GPOS-00014
<GroupDescription></GroupDescription>Group -
The macOS system must limit SSHD to FIPS-compliant connections.
<VulnDiscussion>If SSHD is enabled, it must be configured to limit the Ciphers, HostbasedAcceptedAlgorithms, HostKeyAlgorithms, KexAlgorithms...Rule High Severity -
SRG-OS-000033-GPOS-00014
<GroupDescription></GroupDescription>Group -
The macOS system must limit SSH to FIPS-compliant connections.
<VulnDiscussion>SSH must be configured to limit the Ciphers, HostbasedAcceptedAlgorithms, HostKeyAlgorithms, KexAlgorithms, MACs, PubkeyAccep...Rule High Severity -
The macOS system must set account lockout time to 15 minutes.
<VulnDiscussion>The macOS system must be configured to enforce a lockout time period of at least 15 minutes when the maximum number of failed...Rule Medium Severity -
SRG-OS-000029-GPOS-00010
<GroupDescription></GroupDescription>Group -
The macOS system must enforce screen saver timeout.
<VulnDiscussion>The screen saver timeout must be set to 900 seconds or a shorter length of time. This rule ensures that a full session lock ...Rule Medium Severity -
SRG-OS-000104-GPOS-00051
<GroupDescription></GroupDescription>Group -
The macOS system must disable login to other users' active and locked sessions.
<VulnDiscussion>The ability to log in to another user's active or locked session must be disabled. macOS has a privilege that can be granted...Rule Medium Severity -
SRG-OS-000104-GPOS-00051
<GroupDescription></GroupDescription>Group -
The macOS system must disable root login.
<VulnDiscussion>To assure individual accountability and prevent unauthorized access, logging in as root at the login window must be disabled....Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.