Skip to content

I - Mission Critical Public

Rules and Groups employed by this XCCDF Profile

  • SRG-OS-000004-GPOS-00004

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must generate audit records for all account creations, modifications, disabling, and termination events; privileged activities or other system-level access; all kernel module load, unload, and restart actions; all program initiations; and organizationally defined events for all nonlocal maintenance and diagnostic sessions.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-OS-000032-GPOS-00013

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must monitor remote access methods and generate audit records when successful/unsuccessful attempts to access/modify privileges occur.

    &lt;VulnDiscussion&gt;Frequently, an attacker that successfully gains access to a system has only gained access to an account with limited privileg...
    Rule Medium Severity
  • SRG-OS-000037-GPOS-00015

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must produce audit records containing information to establish when, where, what type, the source, and the outcome for all DOD-defined auditable events and actions.

    &lt;VulnDiscussion&gt;Without establishing what type of events occurred, when they occurred, and by whom, it would be difficult to establish, corre...
    Rule Medium Severity
  • SRG-OS-000047-GPOS-00023

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must shut down by default upon audit failure (unless availability is an overriding concern).

    &lt;VulnDiscussion&gt;The audit service should shut down the computer if it is unable to audit system events. Once audit failure occurs, user and s...
    Rule Medium Severity
  • SRG-OS-000057-GPOS-00027

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must be configured with audit log files owned by root.

    &lt;VulnDiscussion&gt;The audit service must be configured to create log files with the correct ownership to prevent normal users from reading audi...
    Rule Medium Severity
  • SRG-OS-000057-GPOS-00027

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must be configured with audit log folders owned by root.

    &lt;VulnDiscussion&gt;The audit service must be configured to create log files with the correct ownership to prevent normal users from reading audi...
    Rule Medium Severity
  • SRG-OS-000057-GPOS-00027

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must be configured with audit log files group-owned by wheel.

    &lt;VulnDiscussion&gt;The audit service must be configured to create log files with the correct group ownership to prevent normal users from readin...
    Rule Medium Severity
  • SRG-OS-000057-GPOS-00027

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must be configured with audit log folders group-owned by wheel.

    &lt;VulnDiscussion&gt;The audit service must be configured to create log files with the correct group ownership to prevent normal users from readin...
    Rule Medium Severity
  • SRG-OS-000057-GPOS-00027

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must be configured with audit log files set to mode 440 or less permissive.

    &lt;VulnDiscussion&gt;The audit service must be configured to create log files with the correct permissions to prevent normal users from reading au...
    Rule Medium Severity
  • SRG-OS-000057-GPOS-00027

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must be configured with audit log folders set to mode 700 or less permissive.

    &lt;VulnDiscussion&gt;The audit service must be configured to create log folders with the correct permissions to prevent normal users from reading ...
    Rule Medium Severity
  • SRG-OS-000064-GPOS-00033

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must audit the enforcement actions used to restrict access associated with changes to the system.

    &lt;VulnDiscussion&gt;By auditing access restriction enforcement, changes to application and OS configuration files can be audited. Without auditin...
    Rule Medium Severity
  • SRG-OS-000341-GPOS-00132

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must allocate audit record storage capacity to store at least seven days of audit records when audit records are not immediately sent to a central audit record storage facility.

    &lt;VulnDiscussion&gt;The audit service must be configured to require that records are kept for seven days or longer before deletion when there is ...
    Rule Low Severity
  • SRG-OS-000343-GPOS-00134

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must provide an immediate warning to the System Administrator (SA) and Information System Security Officer (ISSO) (at a minimum) when allocated audit record storage volume reaches 75 percent of repository maximum audit record storage capacity.

    &lt;VulnDiscussion&gt;The audit service must be configured to require a minimum percentage of free disk space to run. This ensures that audit will ...
    Rule Low Severity
  • SRG-OS-000344-GPOS-00135

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must provide an immediate real-time alert to the System Administrator (SA) and Information System Security Officer (ISSO), at a minimum, of all audit failure events requiring real-time alerts.

    &lt;VulnDiscussion&gt;The audit service must be configured to immediately print messages to the console or email administrator users when an auditi...
    Rule Medium Severity
  • SRG-OS-000470-GPOS-00214

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must generate audit records for DOD-defined events such as successful/unsuccessful logon attempts, successful/unsuccessful direct access attempts, starting and ending time for user access, and concurrent logons to the same account from different sources.

    &lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficu...
    Rule Medium Severity
  • SRG-OS-000067-GPOS-00035

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must accept and verify Personal Identity Verification (PIV) credentials, implement a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network, and only allow the use of DOD PKI-established certificate authorities for verification of the establishment of protected sessions.

    &lt;VulnDiscussion&gt;The use of PIV credentials facilitates standardization and reduces the risk of unauthorized access. Without configuring a lo...
    Rule Medium Severity
  • SRG-OS-000109-GPOS-00056

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must require individuals to be authenticated with an individual authenticator prior to using a group authenticator.

    &lt;VulnDiscussion&gt;Administrator users must never log in directly as root. To assure individual accountability and prevent unauthorized access, ...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must be configured to disable SMB File Sharing unless it is required.

    &lt;VulnDiscussion&gt;File sharing is usually nonessential and must be disabled if not required. Enabling any service increases the attack surface ...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must be configured to disable the Network File System (NFS) daemon unless it is required.

    &lt;VulnDiscussion&gt;If the system does not require access to NFS file shares or is not acting as an NFS server, support for NFS is nonessential a...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must be configured to disable Location Services.

    &lt;VulnDiscussion&gt;To prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embeddi...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must be configured to disable Bonjour multicast advertising.

    &lt;VulnDiscussion&gt;To prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embeddi...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must be configured to disable the UUCP service.

    &lt;VulnDiscussion&gt;It is detrimental for operating systems to provide, or install by default, functionality exceeding requirements or mission ob...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must be configured to disable Internet Sharing.

    &lt;VulnDiscussion&gt;To prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embeddi...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must be configured to disable Web Sharing.

    &lt;VulnDiscussion&gt;To prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embeddi...
    Rule Medium Severity
  • SRG-OS-000095-GPOS-00049

    <GroupDescription></GroupDescription>
    Group
  • The macOS system must be configured to disable AirDrop.

    &lt;VulnDiscussion&gt;To prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embeddi...
    Rule Low Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules