I - Mission Critical Classified
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000480-GPOS-00227
<GroupDescription></GroupDescription>Group -
The macOS system must restrict the ability of individuals to write to external optical media.
<VulnDiscussion>External writeable media devices must be disabled for users. External optical media devices can be used to exfiltrate sensiti...Rule Low Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
The macOS system must be configured to disable prompts to configure Touch ID.
<VulnDiscussion>It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission ob...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
The macOS system must be configured to disable prompts to configure ScreenTime.
<VulnDiscussion>It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission ob...Rule Low Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
The macOS system must be configured to disable promts to configure Unlock with Watch.
<VulnDiscussion>It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission ob...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
The macOS system must be configured to prevent activity continuation between Apple Devices.
<VulnDiscussion>It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission ob...Rule Low Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
The macOS system must be configured to prevent password proximity sharing requests from nearby Apple Devices.
<VulnDiscussion>It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission ob...Rule Medium Severity -
SRG-OS-000095-GPOS-00049
<GroupDescription></GroupDescription>Group -
The macOS system must be configured to prevent users from erasing all system content and settings.
<VulnDiscussion>It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission ob...Rule Medium Severity -
SRG-OS-000481-GPOS-00481
<GroupDescription></GroupDescription>Group -
The macOS system must be configured with Bluetooth turned off unless approved by the organization.
<VulnDiscussion>Without protection of communications with wireless peripherals, confidentiality and integrity may be compromised because unpr...Rule Low Severity -
SRG-OS-000324-GPOS-00125
<GroupDescription></GroupDescription>Group -
The macOS system must prevent nonprivileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
<VulnDiscussion>Preventing nonprivileged users from executing privileged functions mitigates the risk that unauthorized individuals or proces...Rule Medium Severity -
SRG-OS-000033-GPOS-00014
<GroupDescription></GroupDescription>Group -
The macOS system must implement approved ciphers within the SSH client configuration to protect the confidentiality of SSH connections.
<VulnDiscussion>Operating systems using encryption are required to use FIPS-compliant mechanisms for authenticating to macOS. For OpenSSH to...Rule High Severity -
SRG-OS-000033-GPOS-00014
<GroupDescription></GroupDescription>Group -
The macOS system must implement approved Message Authentication Codes (MACs) within the SSH client configuration.
<VulnDiscussion>Operating systems using encryption are required to use FIPS-compliant mechanisms for authenticating to macOS. For OpenSSH to...Rule High Severity -
SRG-OS-000033-GPOS-00014
<GroupDescription></GroupDescription>Group -
The macOS system must implement approved Key Exchange Algorithms within the SSH client configuration.
<VulnDiscussion>Operating systems using encryption are required to use FIPS-compliant mechanisms for authenticating to macOS. For OpenSSH to...Rule High Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.