No profile (default benchmark)
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000163-GPOS-00072
Group -
The macOS system must configure SSHD unused connection timeout to 900.
If SSHD is enabled, it must be configured with unused connection timeout set to 900. This will set the timeout when there are no open channels within a session. NOTE: /etc/ssh/sshd_config will be...Rule Medium Severity -
SRG-OS-000163-GPOS-00072
Group -
The macOS system must set SSH Active Server Alive Maximum to 0.
SSH must be configured with an Active Server Alive Maximum Count set to 0. Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to tak...Rule Medium Severity -
SRG-OS-000279-GPOS-00109
Group -
The macOS system must enforce auto logout after 86400 seconds of inactivity.
Auto logout must be configured to automatically terminate a user session and log out after 86400 seconds of inactivity. NOTE: The maximum that macOS can be configured for autologoff is 86400 secon...Rule Medium Severity -
SRG-OS-000355-GPOS-00143
Group -
The macOS system must be configured to use an authorized time server.
An approved time server must be the only server configured for use. As of macOS 10.13, only one time server is supported. This rule ensures the uniformity of time stamps for information systems wi...Rule Medium Severity -
SRG-OS-000355-GPOS-00143
Group -
The macOS system must enable the time synchronization daemon.
The macOS time synchronization daemon (timed) must be enabled for proper time synchronization to an authorized time server. NOTE: The time synchronization daemon is enabled by default on macOS. S...Rule Medium Severity -
SRG-OS-000064-GPOS-00033
Group -
The macOS system must configure sudo to log events.
Sudo must be configured to log privilege escalation. Without logging privilege escalation, it is difficult to identify attempted attacks because no audit trail is available for forensic investigat...Rule Medium Severity -
SRG-OS-000004-GPOS-00004
Group -
The macOS system must be configured to audit all administrative action events.
The auditing system must be configured to flag administrative action (ad) events. Administrative action events include changes made to the system (e.g., modifying authentication policies). If audi...Rule Medium Severity -
SRG-OS-000032-GPOS-00013
Group -
The macOS system must be configured to audit all login and logout events.
The audit system must be configured to record all attempts to log in and out of the system (lo). Frequently, an attacker that successfully gains access to a system has only gained access to an acc...Rule Medium Severity -
SRG-OS-000037-GPOS-00015
Group -
The macOS system must enable security auditing.
The information system must be configured to generate audit records. Audit records establish what types of events have occurred, when they occurred, and which users were involved. These records ai...Rule Medium Severity -
SRG-OS-000047-GPOS-00023
Group -
The macOS system must be configured to shut down upon audit failure.
The audit service must be configured to shut down the computer if it is unable to audit system events. Once audit failure occurs, user and system activity are no longer recorded, and malicious act...Rule Medium Severity -
SRG-OS-000057-GPOS-00027
Group -
The macOS system must configure audit log files to be owned by root.
Audit log files must be owned by root. The audit service must be configured to create log files with the correct ownership to prevent normal users from reading audit logs. Audit logs contain sens...Rule Medium Severity -
SRG-OS-000057-GPOS-00027
Group -
The macOS system must configure audit log folders to be owned by root.
Audit log folders must be owned by root. The audit service must be configured to create log folders with the correct ownership to prevent normal users from reading audit logs. Audit logs contain ...Rule Medium Severity -
SRG-OS-000057-GPOS-00027
Group -
The macOS system must configure the audit log files group to wheel.
Audit log files must have the group set to wheel. The audit service must be configured to create log files with the correct group ownership to prevent normal users from reading audit logs. Audit ...Rule Medium Severity -
SRG-OS-000057-GPOS-00027
Group -
The macOS system must configure the audit log folders group to wheel.
Audit log files must have the group set to wheel. The audit service must be configured to create log files with the correct group ownership to prevent normal users from reading audit logs. Audit ...Rule Medium Severity -
SRG-OS-000057-GPOS-00027
Group -
The macOS system must configure audit log files to mode 440 or less permissive.
The audit service must be configured to create log files that are readable only by the root user and group wheel. To achieve this, audit log files must be configured to mode 440 or less permissive ...Rule Medium Severity -
SRG-OS-000057-GPOS-00027
Group -
The macOS system must configure audit log folders to mode 700 or less permissive.
The audit log folder must be configured to mode 700 or less permissive so that only the root user is able to read, write, and execute changes to folders. Because audit logs contain sensitive data ...Rule Medium Severity -
SRG-OS-000057-GPOS-00027
Group -
The macOS system must be configured to audit all deletions of object attributes.
The audit system must be configured to record enforcement actions of attempts to delete file attributes (fd). ***Enforcement actions are the methods or mechanisms used to prevent unauthorized chan...Rule Medium Severity -
SRG-OS-000057-GPOS-00027
Group -
The macOS system must be configured to audit all changes of object attributes.
The audit system must be configured to record enforcement actions of attempts to modify file attributes (fm). Enforcement actions are the methods or mechanisms used to prevent unauthorized changes...Rule Medium Severity -
SRG-OS-000057-GPOS-00027
Group -
The macOS system must be configured to audit all failed read actions on the system.
The audit system must be configured to record enforcement actions of access restrictions, including failed file read (-fr) attempts. Enforcement actions are the methods or mechanisms used to preve...Rule Medium Severity -
SRG-OS-000057-GPOS-00027
Group -
The macOS system must be configured to audit all failed write actions on the system.
The audit system must be configured to record enforcement actions of access restrictions, including failed file write (-fw) attempts. Enforcement actions are the methods or mechanisms used to prev...Rule Medium Severity -
SRG-OS-000341-GPOS-00132
Group -
The macOS system must configure audit retention to seven days.
The audit service must be configured to require that records be kept for an organizational-defined value before deletion unless the system uses a central audit record storage facility. When "expir...Rule Low Severity -
SRG-OS-000046-GPOS-00022
Group -
The macOS system must configure audit capacity warning.
The audit service must be configured to notify the system administrator when the amount of free disk space remaining reaches an organization-defined value. This rule ensures that the system admini...Rule Medium Severity -
SRG-OS-000047-GPOS-00023
Group -
The macOS system must configure audit failure notification.
The audit service must be configured to immediately print messages to the console or email administrator users when an auditing failure occurs. It is critical for the appropriate personnel to be m...Rule Medium Severity -
SRG-OS-000365-GPOS-00152
Group -
The macOS system must be configured to audit all authorization and authentication events.
The auditing system must be configured to flag authorization and authentication (aa) events. Authentication events contain information about the identity of a user, server, or client. Authorizatio...Rule Medium Severity -
SRG-OS-000066-GPOS-00034
Group -
The macOS system must set smart card certificate trust to moderate.
The macOS system must be configured to block access to users who are no longer authorized (i.e., users with revoked certificates). To prevent the use of untrusted certificates, the certificates on...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.