No profile (default benchmark)
Rules and Groups employed by this XCCDF Profile
-
SRG-OS-000028-GPOS-00009
Group -
The macOS system must prevent Apple Watch from terminating a session lock.
Apple Watches are not an approved authenticator and their use must be disabled. Disabling Apple Watches is a necessary step to ensuring that the information system retains a session lock until the...Rule Medium Severity -
SRG-OS-000028-GPOS-00009
Group -
The macOS system must enforce screen saver password.
Users must authenticate when unlocking the screen saver. The screen saver acts as a session lock and prevents unauthorized users from accessing the current user's account.Rule Medium Severity -
SRG-OS-000028-GPOS-00009
Group -
The macOS system must enforce session lock no more than five seconds after screen saver is started.
A screen saver must be enabled and the system must be configured to require a password to unlock once the screen saver has been on for a maximum of five seconds. An unattended system with an exces...Rule Medium Severity -
SRG-OS-000030-GPOS-00011
Group -
The macOS system must configure user session lock when a smart token is removed.
The screen lock must be configured to initiate automatically when the smart token is removed from the system. Session locks are temporary actions taken when users stop work and move away from the ...Rule Medium Severity -
SRG-OS-000031-GPOS-00012
Group -
The macOS system must disable hot corners.
Hot corners must be disabled. The information system conceals, via the session lock, information previously visible on the display with a publicly viewable image. Although hot corners can be used ...Rule Medium Severity -
SRG-OS-000031-GPOS-00012
Group -
The macOS system must prevent AdminHostInfo from being available at LoginWindow.
The system must be configured to not display sensitive information at the LoginWindow. The key AdminHostInfo, when configured, will allow the HostName, IP Address, and operating system version and ...Rule Medium Severity -
SRG-OS-000002-GPOS-00002
Group -
The macOS system must automatically remove or disable temporary or emergency user accounts within 72 hours.
The macOS system can be configured to set an automated termination for 72 hours or less for all temporary or emergency accounts upon account creation. Emergency administrator accounts are privileg...Rule Medium Severity -
SRG-OS-000355-GPOS-00143
Group -
The macOS system must enforce time synchronization.
Time synchronization must be enforced on all networked systems. This rule ensures the uniformity of time stamps for information systems with multiple system clocks and systems connected over a net...Rule Medium Severity -
SRG-OS-000021-GPOS-00005
Group -
The macOS system must limit consecutive failed login attempts to three.
The macOS must be configured to limit the number of failed login attempts to a maximum of three. When the maximum number of failed attempts is reached, the account must be locked for a period of ti...Rule Medium Severity -
SRG-OS-000023-GPOS-00006
Group -
The macOS system must display a policy banner at remote login.
Remote login service must be configured to display a policy banner at login. Displaying a standardized and approved use notification before granting access to the operating system ensures that use...Rule Medium Severity -
SRG-OS-000023-GPOS-00006
Group -
The macOS system must display the Standard Mandatory DOD Notice and Consent Banner at the login window.
Displaying a standardized and approved use notification before granting access to the operating system ensures that users are provided with privacy and security notification verbiage that is consis...Rule Medium Severity -
SRG-OS-000057-GPOS-00027
Group -
The macOS system must configure audit log files to not contain access control lists (ACLs).
The audit log files must not contain ACLs. This rule ensures that audit information and audit files are configured to be readable and writable only by system administrators, thereby preventing una...Rule Medium Severity -
SRG-OS-000057-GPOS-00027
Group -
The macOS system must configure the audit log folder to not contain access control lists (ACLs).
The audit log folder must not contain ACLs. Audit logs contain sensitive data about the system and users. This rule ensures that the audit service is configured to create log folders that are read...Rule Medium Severity -
SRG-OS-000080-GPOS-00048
Group -
The macOS system must disable FileVault automatic login.
If FileVault is enabled, automatic login must be disabled so that both FileVault and login window authentication are required. The default behavior of macOS when FileVault is enabled is to automat...Rule Medium Severity -
SRG-OS-000163-GPOS-00072
Group -
The macOS system must configure SSHD ClientAliveInterval to 900.
If SSHD is enabled, it must be configured with the Client Alive Interval set to 900. This sets a timeout interval in seconds, after which if no data has been received from the client, sshd(8) will...Rule Medium Severity -
SRG-OS-000163-GPOS-00072
Group -
The macOS system must configure SSHD ClientAliveCountMax to 1.
If SSHD is enabled, it must be configured with the Client Alive Maximum Count set to 1. This will set the number of client alive messages that may be sent without the SSH server receiving any mess...Rule Medium Severity -
SRG-OS-000163-GPOS-00072
Group -
The macOS system must set login grace time to 30.
If SSHD is enabled, it must be configured to wait only 30 seconds before timing out login attempts. NOTE: /etc/ssh/sshd_config will be automatically modified to its original state following any up...Rule Medium Severity -
SRG-OS-000033-GPOS-00014
Group -
The macOS system must limit SSHD to FIPS-compliant connections.
If SSHD is enabled, it must be configured to limit the Ciphers, HostbasedAcceptedAlgorithms, HostKeyAlgorithms, KexAlgorithms, MACs, PubkeyAcceptedAlgorithms, CASignatureAlgorithms to algorithms th...Rule High Severity -
SRG-OS-000033-GPOS-00014
Group -
The macOS system must limit SSH to FIPS-compliant connections.
SSH must be configured to limit the Ciphers, HostbasedAcceptedAlgorithms, HostKeyAlgorithms, KexAlgorithms, MACs, PubkeyAcceptedAlgorithms, CASignatureAlgorithms to algorithms that are FIPS-140 val...Rule High Severity -
SRG-OS-000021-GPOS-00005
Group -
The macOS system must set account lockout time to 15 minutes.
The macOS system must be configured to enforce a lockout time period of at least 15 minutes when the maximum number of failed login attempts is reached. This rule protects against malicious users ...Rule Medium Severity -
SRG-OS-000029-GPOS-00010
Group -
The macOS system must enforce screen saver timeout.
The screen saver timeout must be set to 900 seconds or a shorter length of time. This rule ensures that a full session lock is triggered within no more than 900 seconds of inactivity.Rule Medium Severity -
SRG-OS-000104-GPOS-00051
Group -
The macOS system must disable login to other users' active and locked sessions.
The ability to log in to another user's active or locked session must be disabled. macOS has a privilege that can be granted to any user that will allow that user to unlock active users' sessions....Rule Medium Severity -
SRG-OS-000104-GPOS-00051
Group -
The macOS system must disable root login.
To assure individual accountability and prevent unauthorized access, logging in as root at the login window must be disabled. The macOS system must require individuals to be authenticated with an ...Rule Medium Severity -
SRG-OS-000163-GPOS-00072
Group -
The macOS system must configure the SSH ServerAliveInterval to 900.
SSH must be configured with an Active Server Alive Maximum Count set to 900. Setting the Active Server Alive Maximum Count to 900 will log users out after a 900-second interval of inactivity. NOT...Rule Medium Severity -
SRG-OS-000163-GPOS-00072
Group -
The macOS system must configure SSHD channel timeout to 900.
If SSHD is enabled, it must be configured with session ChannelTimeout set to 900. This will set the timeout when the session is inactive. NOTE: /etc/ssh/sshd_config will be automatically modified...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.