No profile (default benchmark)
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000028-GPOS-00009
<GroupDescription></GroupDescription>Group -
The macOS system must enforce screen saver password.
<VulnDiscussion>Users must authenticate when unlocking the screen saver. The screen saver acts as a session lock and prevents unauthorized u...Rule Medium Severity -
SRG-OS-000028-GPOS-00009
<GroupDescription></GroupDescription>Group -
The macOS system must enforce session lock no more than five seconds after screen saver is started.
<VulnDiscussion>A screen saver must be enabled and the system must be configured to require a password to unlock once the screensaver has bee...Rule Medium Severity -
SRG-OS-000030-GPOS-00011
<GroupDescription></GroupDescription>Group -
The macOS system must configure user session lock when a smart token is removed.
<VulnDiscussion>The screen lock must be configured to initiate automatically when the smart token is removed from the system. Session locks ...Rule Medium Severity -
SRG-OS-000031-GPOS-00012
<GroupDescription></GroupDescription>Group -
The macOS system must disable hot corners.
<VulnDiscussion>Hot corners must be disabled. The information system conceals, via the session lock, information previously visible on the d...Rule Medium Severity -
SRG-OS-000029-GPOS-00010
<GroupDescription></GroupDescription>Group -
The macOS system must prevent AdminHostInfo from being available at LoginWindow.
<VulnDiscussion>The system must be configured to not display sensitive information at the LoginWindow. The key AdminHostInfo when configured ...Rule Medium Severity -
SRG-OS-000002-GPOS-00002
<GroupDescription></GroupDescription>Group -
The macOS system must automatically remove or disable temporary or emergency user accounts within 72 hours.
<VulnDiscussion>The macOS is able to be configured to set an automated termination for 72 hours or less for all temporary or emergency accoun...Rule Medium Severity -
SRG-OS-000355-GPOS-00143
<GroupDescription></GroupDescription>Group -
The macOS system must enforce time synchronization.
<VulnDiscussion>Time synchronization must be enforced on all networked systems. This rule ensures the uniformity of time stamps for informat...Rule Medium Severity -
SRG-OS-000021-GPOS-00005
<GroupDescription></GroupDescription>Group -
The macOS system must limit consecutive failed log on attempts to three.
<VulnDiscussion>The macOS must be configured to limit the number of failed log on attempts to a maximum of three. When the maximum number of ...Rule Medium Severity -
SRG-OS-000023-GPOS-00006
<GroupDescription></GroupDescription>Group -
The macOS system must display the Standard Mandatory DOD Notice and Consent Banner at remote log on.
<VulnDiscussion>Displaying a standardized and approved use notification before granting access to the operating system ensures that users are...Rule Medium Severity -
SRG-OS-000023-GPOS-00006
<GroupDescription></GroupDescription>Group -
The macOS system must enforce SSH to display the Standard Mandatory DOD Notice and Consent Banner.
<VulnDiscussion>Displaying a standardized and approved use notification before granting access to the operating system ensures that users are...Rule Medium Severity -
SRG-OS-000023-GPOS-00006
<GroupDescription></GroupDescription>Group -
The macOS system must display the Standard Mandatory DOD Notice and Consent Banner at the login window.
<VulnDiscussion>Displaying a standardized and approved use notification before granting access to the operating system ensures that users are...Rule Medium Severity -
SRG-OS-000057-GPOS-00027
<GroupDescription></GroupDescription>Group -
The macOS system must configure audit log files to not contain access control lists.
<VulnDiscussion>The audit log files must not contain access control lists (ACLs). This rule ensures that audit information and audit files a...Rule Medium Severity -
SRG-OS-000057-GPOS-00027
<GroupDescription></GroupDescription>Group -
The macOS system must configure audit log folders to not contain access control lists.
<VulnDiscussion>The audit log folder must not contain access control lists (ACLs). Audit logs contain sensitive data about the system and us...Rule Medium Severity -
SRG-OS-000080-GPOS-00048
<GroupDescription></GroupDescription>Group -
The macOS system must disable FileVault automatic log on.
<VulnDiscussion>If FileVault is enabled, automatic log on must be disabled, so that both FileVault and login window authentication are requir...Rule Medium Severity -
SRG-OS-000163-GPOS-00072
<GroupDescription></GroupDescription>Group -
The macOS system must configure SSHD ClientAliveInterval to 900.
<VulnDiscussion>If SSHD is enabled, then it must be configured with the Client Alive Interval set to 900. Sets a timeout interval in seconds...Rule Medium Severity -
SRG-OS-000163-GPOS-00072
<GroupDescription></GroupDescription>Group -
The macOS system must configure SSHD ClientAliveCountMax to 1.
<VulnDiscussion>If SSHD is enabled it must be configured with the Client Alive Maximum Count set to 1. This will set the number of client al...Rule Medium Severity -
SRG-OS-000163-GPOS-00072
<GroupDescription></GroupDescription>Group -
The macOS system must set Login Grace Time to 30.
<VulnDiscussion>If SSHD is enabled, then it must be configured to wait only 30 seconds before timing out logon attempts. Note: /etc/ssh/sshd...Rule Medium Severity -
SRG-OS-000033-GPOS-00014
<GroupDescription></GroupDescription>Group -
The macOS system must limit SSHD to FIPS-compliant connections.
<VulnDiscussion>If SSHD is enabled then it must be configured to limit the Ciphers, HostbasedAcceptedAlgorithms, HostKeyAlgorithms, KexAlgori...Rule High Severity -
SRG-OS-000033-GPOS-00014
<GroupDescription></GroupDescription>Group -
The macOS system must limit SSH to FIPS-compliant connections.
<VulnDiscussion>SSH must be configured to limit the Ciphers, HostbasedAcceptedAlgorithms, HostKeyAlgorithms, KexAlgorithms, MACs, PubkeyAccep...Rule High Severity -
SRG-OS-000021-GPOS-00005
<GroupDescription></GroupDescription>Group -
The macOS system must set account lockout time to 15 minutes.
<VulnDiscussion>The macOS must be configured to enforce a lockout time period of at least 15 minutes when the maximum number of failed logon ...Rule Medium Severity -
SRG-OS-000029-GPOS-00010
<GroupDescription></GroupDescription>Group -
The macOS system must enforce screen saver timeout.
<VulnDiscussion>The screen saver timeout must be set to 900 seconds or a shorter length of time. This rule ensures that a full session lock ...Rule Medium Severity -
SRG-OS-000104-GPOS-00051
<GroupDescription></GroupDescription>Group -
The macOS system must disable logon to other user's active and locked sessions.
<VulnDiscussion>The ability to log in to another user's active or locked session must be disabled. macOS has a privilege that can be granted...Rule Medium Severity -
SRG-OS-000104-GPOS-00051
<GroupDescription></GroupDescription>Group -
The macOS system must disable root logon.
<VulnDiscussion>To ensure individual accountability and prevent unauthorized access, logging in as root at the login window must be disabled....Rule Medium Severity -
SRG-OS-000163-GPOS-00072
<GroupDescription></GroupDescription>Group -
The macOS system must configure SSH ServerAliveInterval option set to 900.
<VulnDiscussion>SSH must be configured with an Active Server Alive Maximum Count set to 900. Setting the Active Server Alive Maximum Count t...Rule Medium Severity -
SRG-OS-000163-GPOS-00072
<GroupDescription></GroupDescription>Group -
The macOS system must configure SSHD Channel Timeout to 900.
<VulnDiscussion>If SSHD is enabled it must be configured with session Channel Timeout set to 900. This will set the time out when the sessio...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.