No profile (default benchmark)
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000364-GPOS-00151
<GroupDescription></GroupDescription>Group -
The macOS system must enforce access restrictions.
<VulnDiscussion>Failure to provide logical access restrictions associated with changes to system configuration may have significant effects o...Rule High Severity -
SRG-OS-000366-GPOS-00153
<GroupDescription></GroupDescription>Group -
The macOS system must have the security assessment policy subsystem enabled.
<VulnDiscussion>Any changes to the hardware, software, and/or firmware components of the information system and/or application can potentiall...Rule High Severity -
SRG-OS-000480-GPOS-00229
<GroupDescription></GroupDescription>Group -
The macOS system must not allow an unattended or automatic logon to the system.
<VulnDiscussion>Failure to restrict system access to authenticated users negatively impacts operating system security.</VulnDiscussion>...Rule Medium Severity -
SRG-OS-000480-GPOS-00228
<GroupDescription></GroupDescription>Group -
The macOS system must set permissions on user home directories to prevent users from having access to read or modify another user's files.
<VulnDiscussion>Configuring the operating system to use the most restrictive permissions possible for user home directories helps to protect ...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The macOS system must use an approved antivirus program.
<VulnDiscussion>An approved antivirus product must be installed and configured to run. Malicious software can establish a base on individual...Rule High Severity -
SRG-OS-000066-GPOS-00034
<GroupDescription></GroupDescription>Group -
The macOS system must issue or obtain public key certificates under an appropriate certificate policy from an approved service provider.
<VulnDiscussion>DoD-approved certificates must be installed to the System Keychain so they will be available to all users. For user certific...Rule High Severity -
SRG-OS-000071-GPOS-00039
<GroupDescription></GroupDescription>Group -
The macOS system must enforce password complexity by requiring that at least one numeric character be used.
<VulnDiscussion>Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...Rule Medium Severity -
SRG-OS-000076-GPOS-00044
<GroupDescription></GroupDescription>Group -
The macOS system must enforce a 60-day maximum password lifetime restriction.
<VulnDiscussion>Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed periodically. One me...Rule Medium Severity -
SRG-OS-000077-GPOS-00045
<GroupDescription></GroupDescription>Group -
The macOS system must prohibit password reuse for a minimum of five generations.
<VulnDiscussion>Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute...Rule Medium Severity -
SRG-OS-000078-GPOS-00046
<GroupDescription></GroupDescription>Group -
The macOS system must enforce a minimum 15-character password length.
<VulnDiscussion>The minimum password length must be set to 15 characters. Password complexity, or strength, is a measure of the effectiveness...Rule Medium Severity -
SRG-OS-000266-GPOS-00101
<GroupDescription></GroupDescription>Group -
The macOS system must enforce password complexity by requiring that at least one special character be used.
<VulnDiscussion>Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity o...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The macOS system must be configured to prevent displaying password hints.
<VulnDiscussion>Password hints leak information about passwords in use and can lead to loss of confidentiality.</VulnDiscussion><Fal...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The macOS system must be configured with a firmware password to prevent access to single user mode and booting from alternative media.
<VulnDiscussion>Single user mode and the boot picker, as well as numerous other tools are available on macOS through booting while holding th...Rule Medium Severity -
SRG-OS-000107-GPOS-00054
<GroupDescription></GroupDescription>Group -
The macOS system must use multifactor authentication for local access to privileged and non-privileged accounts.
<VulnDiscussion>Without the use of multifactor authentication, the ease of access to privileged and non-privileged functions is greatly incre...Rule High Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The macOS system must be configured so that the login command requires smart card authentication.
<VulnDiscussion>Configuring the operating system to implement organization-wide security implementation guides and security checklists ensure...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The macOS system must be configured so that the su command requires smart card authentication.
<VulnDiscussion>Configuring the operating system to implement organization-wide security implementation guides and security checklists ensure...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The macOS system must be configured so that the sudo command requires smart card authentication.
<VulnDiscussion>Configuring the operating system to implement organization-wide security implementation guides and security checklists ensure...Rule Medium Severity -
SRG-OS-000206-GPOS-00084
<GroupDescription></GroupDescription>Group -
The macOS system must be configured with system log files owned by root and group-owned by wheel or admin.
<VulnDiscussion>System logs should only be readable by root or admin users. System logs frequently contain sensitive information that could b...Rule Medium Severity -
SRG-OS-000206-GPOS-00084
<GroupDescription></GroupDescription>Group -
The macOS system must be configured with system log files set to mode 640 or less permissive.
<VulnDiscussion>System logs should only be readable by root or admin users. System logs frequently contain sensitive information that could b...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The macOS system must be configured with the sudoers file configured to authenticate users on a per -tty basis.
<VulnDiscussion>The "sudo" command must be configured to prompt for the administrator's password at least once in each newly opened Terminal ...Rule High Severity -
SRG-OS-000051-GPOS-00024
<GroupDescription></GroupDescription>Group -
The macOS system must enable System Integrity Protection.
<VulnDiscussion>System Integrity Protection (SIP) is vital to the protection of the integrity of macOS. SIP restricts what actions can be per...Rule Medium Severity -
SRG-OS-000185-GPOS-00079
<GroupDescription></GroupDescription>Group -
The macOS system must implement cryptographic mechanisms to protect the confidentiality and integrity of all information at rest.
<VulnDiscussion>Information at rest refers to the state of information when it is located on a secondary storage device (e.g., disk drive and...Rule Medium Severity -
SRG-OS-000480-GPOS-00232
<GroupDescription></GroupDescription>Group -
The macOS Application Firewall must be enabled.
<VulnDiscussion>Firewalls protect computers from network attacks by blocking or limiting access to open network ports. Application firewalls ...Rule Medium Severity -
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The macOS system must restrict the ability to utilize external writeable media devices.
<VulnDiscussion>External writeable media devices must be disabled for users. External USB devices are a potential vector for malware and can ...Rule Medium Severity -
SRG-OS-000480-GPOS-00229
<GroupDescription></GroupDescription>Group -
The macOS system logon window must be configured to prompt for username and password, rather than show a list of users.
<VulnDiscussion>The logon window must be configured to prompt all users for both a username and a password. By default, the system displays a...Rule Low Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.