III - Administrative Public
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000163-GPOS-00072
<GroupDescription></GroupDescription>Group -
The macOS system must configure SSHD unused connection timeout to 900.
<VulnDiscussion>If SSHD is enabled, it must be configured with unused connection timeout set to 900. This will set the timeout when there ar...Rule Medium Severity -
SRG-OS-000163-GPOS-00072
<GroupDescription></GroupDescription>Group -
The macOS system must set SSH Active Server Alive Maximum to 0.
<VulnDiscussion>SSH must be configured with an Active Server Alive Maximum Count set to 0. Terminating an idle session within a short time pe...Rule Medium Severity -
SRG-OS-000279-GPOS-00109
<GroupDescription></GroupDescription>Group -
The macOS system must enforce auto logout after 86400 seconds of inactivity.
<VulnDiscussion>Auto logout must be configured to automatically terminate a user session and log out after 86400 seconds of inactivity. NOTE...Rule Medium Severity -
SRG-OS-000355-GPOS-00143
<GroupDescription></GroupDescription>Group -
The macOS system must be configured to use an authorized time server.
<VulnDiscussion>An approved time server must be the only server configured for use. As of macOS 10.13, only one time server is supported. Th...Rule Medium Severity -
SRG-OS-000355-GPOS-00143
<GroupDescription></GroupDescription>Group -
The macOS system must enable the time synchronization daemon.
<VulnDiscussion>The macOS time synchronization daemon (timed) must be enabled for proper time synchronization to an authorized time server. ...Rule Medium Severity -
SRG-OS-000064-GPOS-00033
<GroupDescription></GroupDescription>Group -
The macOS system must configure sudo to log events.
<VulnDiscussion>Sudo must be configured to log privilege escalation. Without logging privilege escalation, it is difficult to identify attem...Rule Medium Severity -
SRG-OS-000004-GPOS-00004
<GroupDescription></GroupDescription>Group -
The macOS system must be configured to audit all administrative action events.
<VulnDiscussion>The auditing system must be configured to flag administrative action (ad) events. Administrative action events include chang...Rule Medium Severity -
SRG-OS-000032-GPOS-00013
<GroupDescription></GroupDescription>Group -
The macOS system must be configured to audit all login and logout events.
<VulnDiscussion>The audit system must be configured to record all attempts to log in and out of the system (lo). Frequently, an attacker tha...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
<GroupDescription></GroupDescription>Group -
The macOS system must enable security auditing.
<VulnDiscussion>The information system must be configured to generate audit records. Audit records establish what types of events have occur...Rule Medium Severity -
SRG-OS-000047-GPOS-00023
<GroupDescription></GroupDescription>Group -
The macOS system must be configured to shut down upon audit failure.
<VulnDiscussion>The audit service must be configured to shut down the computer if it is unable to audit system events. Once audit failure oc...Rule Medium Severity -
SRG-OS-000057-GPOS-00027
<GroupDescription></GroupDescription>Group -
The macOS system must configure audit log files to be owned by root.
<VulnDiscussion>Audit log files must be owned by root. The audit service must be configured to create log files with the correct ownership t...Rule Medium Severity -
SRG-OS-000057-GPOS-00027
<GroupDescription></GroupDescription>Group -
The macOS system must configure audit log folders to be owned by root.
<VulnDiscussion>Audit log folders must be owned by root. The audit service must be configured to create log folders with the correct ownersh...Rule Medium Severity -
SRG-OS-000057-GPOS-00027
<GroupDescription></GroupDescription>Group -
The macOS system must configure the audit log files group to wheel.
<VulnDiscussion>Audit log files must have the group set to wheel. The audit service must be configured to create log files with the correct ...Rule Medium Severity -
SRG-OS-000057-GPOS-00027
<GroupDescription></GroupDescription>Group -
The macOS system must configure the audit log folders group to wheel.
<VulnDiscussion>Audit log files must have the group set to wheel. The audit service must be configured to create log files with the correct ...Rule Medium Severity -
SRG-OS-000057-GPOS-00027
<GroupDescription></GroupDescription>Group -
The macOS system must configure audit log files to mode 440 or less permissive.
<VulnDiscussion>The audit service must be configured to create log files that are readable only by the root user and group wheel. To achieve ...Rule Medium Severity -
SRG-OS-000057-GPOS-00027
<GroupDescription></GroupDescription>Group -
The macOS system must configure audit log folders to mode 700 or less permissive.
<VulnDiscussion>The audit log folder must be configured to mode 700 or less permissive so that only the root user is able to read, write, and...Rule Medium Severity -
SRG-OS-000057-GPOS-00027
<GroupDescription></GroupDescription>Group -
The macOS system must be configured to audit all deletions of object attributes.
<VulnDiscussion>The audit system must be configured to record enforcement actions of attempts to delete file attributes (fd). ***Enforcement...Rule Medium Severity -
SRG-OS-000057-GPOS-00027
<GroupDescription></GroupDescription>Group -
The macOS system must be configured to audit all changes of object attributes.
<VulnDiscussion>The audit system must be configured to record enforcement actions of attempts to modify file attributes (fm). Enforcement ac...Rule Medium Severity -
SRG-OS-000057-GPOS-00027
<GroupDescription></GroupDescription>Group -
The macOS system must be configured to audit all failed read actions on the system.
<VulnDiscussion>The audit system must be configured to record enforcement actions of access restrictions, including failed file read (-fr) at...Rule Medium Severity -
SRG-OS-000057-GPOS-00027
<GroupDescription></GroupDescription>Group -
The macOS system must be configured to audit all failed write actions on the system.
<VulnDiscussion>The audit system must be configured to record enforcement actions of access restrictions, including failed file write (-fw) a...Rule Medium Severity -
SRG-OS-000341-GPOS-00132
<GroupDescription></GroupDescription>Group -
The macOS system must configure audit retention to seven days.
<VulnDiscussion>The audit service must be configured to require that records be kept for an organizational-defined value before deletion unle...Rule Low Severity -
SRG-OS-000046-GPOS-00022
<GroupDescription></GroupDescription>Group -
The macOS system must configure audit capacity warning.
<VulnDiscussion>The audit service must be configured to notify the system administrator when the amount of free disk space remaining reaches ...Rule Medium Severity -
SRG-OS-000047-GPOS-00023
<GroupDescription></GroupDescription>Group -
The macOS system must configure audit failure notification.
<VulnDiscussion>The audit service must be configured to immediately print messages to the console or email administrator users when an auditi...Rule Medium Severity -
SRG-OS-000365-GPOS-00152
<GroupDescription></GroupDescription>Group -
The macOS system must be configured to audit all authorization and authentication events.
<VulnDiscussion>The auditing system must be configured to flag authorization and authentication (aa) events. Authentication events contain i...Rule Medium Severity -
SRG-OS-000066-GPOS-00034
<GroupDescription></GroupDescription>Group -
The macOS system must set smart card certificate trust to moderate.
<VulnDiscussion>The macOS system must be configured to block access to users who are no longer authorized (i.e., users with revoked certifica...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.