Skip to content

I - Mission Critical Public

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000163-GPOS-00072

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must be configured with the SSH daemon ClientAliveInterval option set to 900 or less.

    &lt;VulnDiscussion&gt;Terminating an idle session within a short time reduces the window of opportunity for unauthorized personnel to take control ...
    Rule Medium Severity
  • SRG-OS-000163-GPOS-00072

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must be configured with the SSH daemon ClientAliveCountMax option set to 1.

    &lt;VulnDiscussion&gt;Terminating an idle session within a short time reduces the window of opportunity for unauthorized personnel to take control ...
    Rule Medium Severity
  • SRG-OS-000163-GPOS-00072

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must be configured with the SSH daemon LoginGraceTime set to 30 or less.

    &lt;VulnDiscussion&gt;SSH must be configured to log users out after a 15-minute interval of inactivity and to wait only 30 seconds before timing ou...
    Rule Medium Severity
  • SRG-OS-000033-GPOS-00014

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must implement approved ciphers to protect the confidentiality of SSH connections.

    &lt;VulnDiscussion&gt;Unapproved mechanisms for authentication to the cryptographic module are not verified and therefore cannot be relied on to pr...
    Rule High Severity
  • SRG-OS-000033-GPOS-00014

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must implement approved Message Authentication Codes (MACs).

    &lt;VulnDiscussion&gt;Unapproved mechanisms for authentication to the cryptographic module are not verified and therefore cannot be relied on to pr...
    Rule High Severity
  • SRG-OS-000033-GPOS-00014

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must implement approved Key Exchange Algorithms.

    &lt;VulnDiscussion&gt;Unapproved mechanisms for authentication to the cryptographic module are not verified and therefore cannot be relied on to pr...
    Rule High Severity
  • SRG-OS-000004-GPOS-00004

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must generate audit records for all account creations, modifications, disabling, and termination events; privileged activities or other system-level access; all kernel module load, unload, and restart actions; all program initiations; and organizationally defined events for all nonlocal maintenance and diagnostic sessions.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-OS-000032-GPOS-00013

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must monitor remote access methods and generate audit records when successful/unsuccessful attempts to access/modify privileges occur.

    &lt;VulnDiscussion&gt;Frequently, an attacker that successfully gains access to a system has only gained access to an account with limited privileg...
    Rule Medium Severity
  • SRG-OS-000037-GPOS-00015

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must produce audit records containing information to establish when, where, what type, the source, and the outcome for all DOD-defined auditable events and actions.

    &lt;VulnDiscussion&gt;Without establishing what type of events occurred, when they occurred, and by whom, it would be difficult to establish, corre...
    Rule Medium Severity
  • SRG-OS-000047-GPOS-00023

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must shut down by default upon audit failure (unless availability is an overriding concern).

    &lt;VulnDiscussion&gt;The audit service should shut down the computer if it is unable to audit system events. Once audit failure occurs, user and s...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules