Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000163-GPOS-00072

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must be configured with the SSH daemon ClientAliveCountMax option set to 1.

    &lt;VulnDiscussion&gt;Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take c...
    Rule Medium Severity
  • SRG-OS-000163-GPOS-00072

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must be configured with the SSH daemon LoginGraceTime set to 30 or less.

    &lt;VulnDiscussion&gt;SSH should be configured to log users out after a 15-minute interval of inactivity and to wait only 30 seconds before timing ...
    Rule Medium Severity
  • SRG-OS-000033-GPOS-00014

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must implement approved ciphers within the SSH server configuration to protect the confidentiality of SSH connections.

    &lt;VulnDiscussion&gt;Operating systems using encryption are required to use FIPS-compliant mechanisms for authenticating to macOS. For OpenSSH to...
    Rule High Severity
  • SRG-OS-000033-GPOS-00014

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must implement approved Message Authentication Codes (MACs) within the SSH server configuration.

    &lt;VulnDiscussion&gt;Operating systems using encryption are required to use FIPS-compliant mechanisms for authenticating to macOS. For OpenSSH to...
    Rule High Severity
  • SRG-OS-000033-GPOS-00014

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must implement approved Key Exchange Algorithms within the SSH server configuration.

    &lt;VulnDiscussion&gt;Operating systems using encryption are required to use FIPS-compliant mechanisms for authenticating to macOS. For OpenSSH to...
    Rule High Severity
  • SRG-OS-000004-GPOS-00004

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must generate audit records for all account creations, modifications, disabling, and termination events; privileged activities or other system-level access; all kernel module load, unload, and restart actions; all program initiations; and organizationally defined events for all non-local maintenance and diagnostic sessions.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-OS-000032-GPOS-00013

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must monitor remote access methods and generate audit records when successful/unsuccessful attempts to access/modify privileges occur.

    &lt;VulnDiscussion&gt;Frequently, an attacker that successfully gains access to a system has only gained access to an account with limited privileg...
    Rule Medium Severity
  • SRG-OS-000037-GPOS-00015

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must initiate session audits at system startup, using internal clocks with time stamps for audit records that meet a minimum granularity of one second and can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT), in order to generate audit records containing information to establish what type of events occurred, the identity of any individual or process associated with the event, including individual identities of group account users, establish where the events occurred, source of the event, and outcome of the events including all account enabling actions, full-text recording of privileged commands, and information about the use of encryption for access wireless access to and from the system.

    &lt;VulnDiscussion&gt;Without establishing what type of events occurred, when they occurred, and by whom it would be difficult to establish, correl...
    Rule Medium Severity
  • SRG-OS-000047-GPOS-00023

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must shut down by default upon audit failure (unless availability is an overriding concern).

    &lt;VulnDiscussion&gt;The audit service should shut down the computer if it is unable to audit system events. Once audit failure occurs, user and s...
    Rule Medium Severity
  • SRG-OS-000057-GPOS-00027

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must be configured with audit log files owned by root.

    &lt;VulnDiscussion&gt;The audit service must be configured to create log files with the correct ownership to prevent normal users from reading audi...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules