DISA STIGS Viewer

Apple macOS 14 (Sonoma) Security Technical Implementation Guide

Overview

Version Date Finding Count (155) Downloads
2 2024-12-04 CAT I (High): 10 CAT II (Medium): 143 CAT III (Low): 2 Excel JSON XML
Stig Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.
Classified Public Sensitive  
I - Mission Critical Classified I - Mission Critical Public I - Mission Critical Sensitive II - Mission Critical Classified II - Mission Critical Public II - Mission Critical Sensitive III - Mission Critical Classified III - Mission Critical Public III - Mission Critical Sensitive

Findings - All

Finding ID Severity Title Description
V-259561 High The macOS system must enforce FileVault. FileVault must be enforced. The information system implements cryptographic mechanisms to protect the confidentiality and integrity of information stored on digital media during transport outside of controlled areas. Satisfies: SRG-OS-000185-GPOS-00079,SRG-OS-000404-GPOS-00183,SRG-OS-000405-GPOS-00184
V-259560 High The macOS system must ensure System Integrity Protection is enabled. System Integrity Protection (SIP) must be enabled. SIP is vital to protecting the integrity of the system as it prevents malicious users and software from making unauthorized and/or unintended modifications to protected files and folders; ensures the presence of an audit record generation capability for defined auditable events for all...
V-259515 High The macOS system must require administrator privileges to modify systemwide settings. The system must be configured to require an administrator password in order to modify the systemwide preferences in System Settings. Some Preference Panes in System Settings contain settings that affect the entire system. Requiring a password to unlock these systemwide settings reduces the risk of a nonauthorized user modifying system...
V-259512 High The macOS system must enable Gatekeeper. Gatekeeper must be enabled. Gatekeeper is a security feature that ensures applications are digitally signed by an Apple-issued certificate before they are permitted to run. Digital signatures allow the macOS host to verify that the application has not been modified by a malicious third party. Administrator users will still have...
V-259510 High The macOS system must disable Bluetooth when no approved device is connected. The macOS system must be configured to disable Bluetooth unless an approved device is connected. [IMPORTANT] ==== Information system security officers (ISSOs) may make the risk-based decision not to disable Bluetooth to maintain necessary functionality, but they are advised to first fully weigh the potential risks posed to their organization....
V-259509 High The macOS system must apply gatekeeper settings to block applications from unidentified developers. The information system implements cryptographic mechanisms to authenticate software prior to installation. Gatekeeper settings must be configured correctly to only allow the system to run applications downloaded from the Mac App Store or applications signed with a valid Apple Developer ID code. Administrator users will still have the option to...
V-259499 High The macOS system must disable Trivial File Transfer Protocol service. If the system does not require Trivial File Transfer Protocol (TFTP), support it is nonessential and must be disabled. The information system must be configured to provide only essential capabilities. Disabling TFTP helps prevent the unauthorized connection of devices and the unauthorized transfer of information. Note: TFTP service is disabled...
V-259477 High The macOS system must disable password authentication for SSH. If remote logon through SSH is enabled, password-based authentication must be disabled for user logon. All users must go through multifactor authentication to prevent unauthenticated access and potential compromise to the system. Note: /etc/ssh/sshd_config will be automatically modified to its original state following any update or major upgrade to the...
V-259439 High The macOS system must limit SSH to FIPS-compliant connections. SSH must be configured to limit the Ciphers, HostbasedAcceptedAlgorithms, HostKeyAlgorithms, KexAlgorithms, MACs, PubkeyAcceptedAlgorithms, CASignatureAlgorithms to algorithms that are FIPS 140 validated. FIPS 140-2 is the current standard for validating that mechanisms used to access cryptographic modules utilize authentication that meet federal requirements. Operating systems utilizing encryption must use FIPS-validated mechanisms...
V-259438 High The macOS system must limit SSHD to FIPS-compliant connections. If SSHD is enabled then it must be configured to limit the Ciphers, HostbasedAcceptedAlgorithms, HostKeyAlgorithms, KexAlgorithms, MACs, PubkeyAcceptedAlgorithms, CASignatureAlgorithms to algorithms that are FIPS 140 validated. FIPS 140-2 is the current standard for validating that mechanisms used to access cryptographic modules utilize authentication that meet federal requirements. Operating systems utilizing...
V-259576 Medium The macOS system must enforce installation of XProtect Remediator and Gatekeeper updates automatically. Software Update must be configured to update XProtect Remediator and Gatekeeper automatically. This setting enforces definition updates for XProtect Remediator and Gatekeeper; with this setting in place, new malware and adware that Apple has added to the list of malware or untrusted software will not execute. These updates do not...
V-259575 Medium The macOS system must enable recovery lock. A recovery lock password must be enabled and set. Single user mode, recovery mode, the Startup Manager, and several other tools are available on macOS by holding down specific key combinations during startup. Setting a recovery lock restricts access to these tools. IMPORTANT: Recovery lock passwords are not supported on...
V-259574 Medium The macOS system must enforce enrollment in mobile device management. Users must enroll their Mac in a Mobile Device Management (MDM) software. User Approved MDM (UAMDM) enrollment or enrollment via Apple Business Manager (ABM)/Apple School Manager (ASM) is required to manage certain security settings. Currently these include: * Allowed Kernel Extensions * Allowed Approved System Extensions * Privacy Preferences Policy...
V-259573 Medium The macOS system must ensure secure boot level set to full. The Secure Boot security setting must be set to full. Full security is the default Secure Boot setting in macOS. During startup, when Secure Boot is set to full security, the Mac will verify the integrity of the operating system before allowing the operating system to boot. Note: This will...
V-259572 Medium The macOS system must authorize USB devices before allowing connection. USB devices connected to a Mac must be authorized. [IMPORTANT] ==== This feature is removed if a smart card is paired or smart card attribute mapping is configured. ====
V-259571 Medium The macOS system must prohibit user installation of software into /users/. Users must not be allowed to install software into /users/. Allowing users who do not possess explicit privileges to install software presents the risk of untested and potentially malicious software being installed on the system. Explicit privileges (escalated or administrative privileges) provide the regular user with explicit capabilities and control...
V-259570 Medium The macOS system must enable Authenticated Root. Authenticated Root must be enabled. When Authenticated Root is enabled the macOS is booted from a signed volume that is cryptographically protected to prevent tampering with the system volume. Note: Authenticated Root is enabled by default on macOS systems. WARNING: If more than one partition with macOS is detected, the...
V-259569 Medium The macOS system must disable Erase Content and Settings. Erase Content and Settings must be disabled.
V-259568 Medium The macOS system must disable proximity-based password sharing requests. Proximity-based password sharing requests must be disabled. The default behavior of macOS is to allow users to request passwords from other known devices (macOS and iOS). This feature must be disabled to prevent passwords from being shared.
V-259567 Medium The macOS system must disable Handoff. Handoff must be disabled. Handoff allows users to continue working on a document or project when the user switches from one Apple device to another. Disabling Handoff prevents data transfers to unauthorized devices. Satisfies: SRG-OS-000080-GPOS-00048,SRG-OS-000095-GPOS-00049,SRG-OS-000300-GPOS-00118
V-259566 Medium The macOS system must disable Unlock with Apple Watch during Setup Assistant. The prompt for Apple Watch unlock setup during Setup Assistant must be disabled. Disabling Apple watches is a necessary step to ensuring that the information system retains a session lock until the user reestablishes access using an authorized identification and authentication procedures.
V-259565 Medium The macOS system must disable Screen Time prompt during Setup Assistant. The prompt for Screen Time setup during Setup Assistant must be disabled.
V-259564 Medium The macOS system must disable TouchID prompt during Setup Assistant. The prompt for TouchID during Setup Assistant must be disabled. macOS prompts new users through enabling TouchID during Setup Assistant; this is not essential, and therefore must be disabled to prevent against the risk of individuals electing to enable TouchID to override organizationwide settings.
V-259563 Medium The macOS system must configure login window to prompt for username and password. The login window must be configured to prompt all users for both a username and a password. By default, the system displays a list of known users on the login window, which can make it easier for a malicious user to gain access to someone else's account. Requiring users to...
V-259562 Medium The macOS system must enable the application firewall. The macOS Application Firewall is the built-in firewall that comes with macOS, and it must be enabled. When the macOS Application Firewall is enabled, the flow of information within the information system and between interconnected systems will be controlled by approved authorizations.
V-259559 Medium The macOS system must configure sudoers timestamp type. The file /etc/sudoers must be configured to not include a timestamp_type of global or ppid and be configured for timestamp record types of tty. This rule ensures that the "sudo" command will prompt for the administrator's password at least once in each newly opened terminal window. This prevents a malicious...
V-259557 Medium The macOS system must configure system log files to mode 640 or less permissive. The system logs must be configured to be writable by root and readable only by the root user and group wheel. To achieve this, system log files must be configured to mode 640 permissive or less; thereby preventing normal users from reading, modifying, or deleting audit logs. System logs frequently...
V-259556 Medium The macOS system must configure system log files to be owned by root and group to wheel. The system log files must be owned by root. System logs contain sensitive data about the system and users. If log files are set to only be readable and writable by system administrators, the risk is mitigated. Satisfies: SRG-OS-000205-GPOS-00083,SRG-OS-000206-GPOS-00084
V-259555 Medium The macOS system must require users to reauthenticate for privilege escalation when using the "sudo" command. The file /etc/sudoers must include a timestamp_timout of 0. Without reauthentication, users may access resources or perform tasks for which they do not have authorization. When operating systems provide the capability to escalate a functional capability or change user authenticators, it is critical the user reauthenticate. Satisfies: SRG-OS-000373-GPOS-00156,SRG-OS-000373-GPOS-00157,SRG-OS-000373-GPOS-00158
V-259554 Medium The macOS system must configure Apple System Log files to mode 640 or less permissive. The Apple System Logs (ASL) must be configured to be writable by root and readable only by the root user and group wheel. To achieve this, ASL log files must be configured to mode 640 permissive or less; thereby preventing normal users from reading, modifying, or deleting audit logs. System...
V-259553 Medium The macOS system must configure Apple System Log files to be owned by root and group to wheel. The Apple System Logs (ASL) must be owned by root. ASL logs contain sensitive data about the system and users. If ASL log files are set to only be readable and writable by system administrators, the risk is mitigated. Satisfies: SRG-OS-000205-GPOS-00083,SRG-OS-000206-GPOS-00084
V-259552 Medium The macOS system must disable accounts after 35 days of inactivity. The macOS must be configured to disable accounts after 35 days of inactivity. This rule prevents malicious users from making use of unused accounts to gain access to the system while avoiding detection.
V-259551 Medium The macOS system must set minimum password lifetime to 24 hours. The macOS must be configured to enforce a minimum password lifetime limit of 24 hours. This rule discourages users from cycling through their previous passwords to get back to a preferred one. Note: The guidance for password-based authentication in NIST 800-53 (Rev 5) and NIST 800-63B state that complexity rules...
V-259550 Medium The macOS system must require passwords contain a minimum of one lowercase character and one uppercase character. The macOS be configured to require at least one lowercase character and one uppercase character be used when a password is created. This rule enforces password complexity by requiring users to set passwords that are less vulnerable to malicious users. Note: The guidance for password-based authentication in NIST 800-53 (Rev...
V-259549 Medium The macOS system must enforce multifactor authentication for privilege escalation through the sudo command. The system must be configured to enforce multifactor authentication when the sudo command is used to elevate privilege. All users must go through multifactor authentication to prevent unauthenticated access and potential compromise to the system. IMPORTANT: Modification of Pluggable Authentication Modules (PAM) now requires user authorization, or use of a...
V-259548 Medium The macOS system must enforce multifactor authentication for the su command. The system must be configured such that, when the su command is used, multifactor authentication is enforced. All users must go through multifactor authentication to prevent unauthenticated access and potential compromise to the system. IMPORTANT: Modification of Pluggable Authentication Modules (PAM) now requires user authorization or use of a Privacy...
V-259547 Medium The macOS system must enforce multifactor authentication for logon. The system must be configured to enforce multifactor authentication. All users must go through multifactor authentication to prevent unauthenticated access and potential compromise to the system. IMPORTANT: Modification of Pluggable Authentication Modules (PAM) now requires user authorization or use of a Privacy Preferences Policy Control (PPPC) profile from MDM that...
V-259546 Medium The macOS system must allow smart card authentication. Smart card authentication must be allowed. The use of smart card credentials facilitates standardization and reduces the risk of unauthorized access. When enabled, the smart card can be used for logon, authorization, and screen saver unlocking. Satisfies: SRG-OS-000068-GPOS-00036,SRG-OS-000105-GPOS-00052,SRG-OS-000106-GPOS-00053,SRG-OS-000107-GPOS-00054,SRG-OS-000108-GPOS-00055,SRG-OS-000112-GPOS-00057,SRG-OS-000376-GPOS-00161
V-259545 Medium The macOS system must enforce smart card authentication. Smart card authentication must be enforced. The use of smart card credentials facilitates standardization and reduces the risk of unauthorized access. When enforceSmartCard is set to "true", the smart card must be used for logon, authorization, and unlocking the screen saver. CAUTION: enforceSmartCard will apply to the whole system. No...
V-259544 Medium The macOS system must remove password hints from user accounts. User accounts must not contain password hints. Password hints leak information about passwords that are currently in use and can lead to loss of confidentiality.
V-259543 Medium The macOS system must enable firmware password. A firmware password must be enabled and set. Single user mode, recovery mode, the Startup Manager, and several other tools are available on macOS by holding the "Option" key down during startup. Setting a firmware password restricts access to these tools. To set a firmware passcode use the following command:...
V-259542 Medium The macOS system must disable password hints. Password hints must be disabled. Password hints leak information about passwords that are currently in use and can lead to loss of confidentiality.
V-259541 Medium The macOS system must require passwords contain a minimum of one special character. The macOS must be configured to require at least one special character be used when a password is created. Special characters are those characters that are not alphanumeric. Examples include: ~ ! @ # $ % ^ *. This rule enforces password complexity by requiring users to set passwords that...
V-259540 Medium The macOS system must require a minimum password length of 14 characters. The macOS must be configured to require a minimum of 14 characters be used when a password is created. This rule enforces password complexity by requiring users to set passwords that are less vulnerable to malicious users. Note: The guidance for password-based authentication in NIST 800-53 (Rev 5) and NIST...
V-259538 Medium The macOS system must restrict maximum password lifetime to 60 days. The macOS must be configured to enforce a maximum password lifetime limit of at least 60 days. This rule ensures that users are forced to change their passwords frequently enough to prevent malicious users from gaining and maintaining access to the system. Note: The guidance for password-based authentication in NIST...
V-259537 Medium The macOS system must require passwords contain a minimum of one numeric character. The macOS must be configured to require at least one numeric character be used when a password is created. This rule enforces password complexity by requiring users to set passwords that are less vulnerable to malicious users. Note: The guidance for password-based authentication in NIST 800-53 (Rev 5) and NIST...
V-259536 Medium The macOS system must issue or obtain public key certificates from an approved service provider. The organization must issue or obtain public key certificates from an organization-approved service provider and ensure only approved trust anchors are in the System Keychain.
V-259535 Medium The macOS system must disable the iCloud Freeform services. The macOS built-in Freeform.app connection to Apple's iCloud service must be disabled. Apple's iCloud service does not provide an organization with enough control over the storage and access of data and, therefore, automated calendar synchronization must be controlled by an organization approved service.
V-259534 Medium The macOS system must disable the Bluetooth system settings pane. The Bluetooth System Setting pane must be disabled to prevent access to the Bluetooth configuration.
V-259533 Medium The macOS system must disable Remote Management. Remote Management must be disabled.
V-259532 Medium The macOS system must disable Printer Sharing. Printer Sharing must be disabled.
V-259531 Medium The macOS system must disable dictation. Dictation must be disabled on Intel-based Macs as the feature On Device Dictation is only available on Apple Silicon devices.
V-259530 Medium The macOS system must enforce on device dictation. Dictation must be restricted to on device only to prevent potential data exfiltration. The information system must be configured to provide only essential capabilities.
V-259529 Medium The macOS system must disable sending Siri and Dictation information to Apple. The ability for Apple to store and review audio of Siri and Dictation interactions must be disabled. The information system must be configured to provide only essential capabilities. Disabling the submission of Siri and Dictation information will mitigate the risk of unwanted data being sent to Apple.
V-259528 Medium The macOS system must disable personalized advertising. Ad tracking and targeted ads must be disabled. The information system must be configured to provide only essential capabilities. Disabling ad tracking ensures that applications and advertisers are unable to track users' interests and deliver targeted advertisements.
V-259527 Medium The macOS system must disable password autofill. Password Autofill must be disabled. macOS allows users to save passwords and use the Password Autofill feature in Safari and compatible apps. To protect against malicious users gaining access to the system, this feature must be disabled to prevent users from being prompted to save passwords in applications.
V-259526 Medium The macOS system must disable Find My service. The Find My service must be disabled. A Mobile Device Management (MDM) solution must be used to carry out remote locking and wiping instead of Apple's Find My service. Apple's Find My service uses a personal AppleID for authentication. Organizations should rely on MDM solutions, which have much more secure...
V-259525 Medium The macOS system must disable iCloud Private Relay. Enterprise networks may be required to audit all network traffic by policy; therefore, iCloud Private Relay must be disabled. Network administrators can also prevent the use of this feature by blocking DNS resolution of mask.icloud.com and mask-h2.icloud.com.
V-259524 Medium The macOS system must disable iCloud Game Center. This works only with supervised devices (MDM) and allows Apple Game Center to be disabled. The rationale is Game Center is using Apple ID and will share data on AppleID-based services; therefore, Game Center must be disabled. This setting also prohibits the functionality of adding friends to Game Center.
V-259523 Medium The macOS system must disable iCloud desktop and document folder synchronization. The macOS system's ability to automatically synchronize a user's desktop and documents folder to their iCloud Drive must be disabled. Apple's iCloud service does not provide an organization with enough control over the storage and access of data and, therefore, automated file synchronization must be controlled by an organization approved...
V-259522 Medium The macOS system must disable content caching service. Content caching must be disabled. Content caching is a macOS service that helps reduce internet data usage and speed up software installation on Mac computers. It is not recommended for devices furnished to employees to act as a caching server.
V-259521 Medium The macOS system must disable CD/DVD Sharing. CD/DVD Sharing must be disabled.
V-259520 Medium The macOS system must disable AppleID and Internet Account modifications. The system must disable account modification. Account modification includes adding additional or modifying internet accounts in Apple Mail, Calendar, Contacts, in the Internet Account System Setting Pane, or the AppleID System Setting Pane. This prevents the addition of unauthorized accounts. [IMPORTANT] ==== Some organizations may allow the use and configuration...
V-259519 Medium The macOS system must disable Bluetooth sharing.
V-259518 Medium The macOS system must disable Media Sharing. Media sharing must be disabled. When Media Sharing is enabled, the computer starts a network listening service that shares the contents of the user's music collection with other users in the same subnet. The information system must be configured to provide only essential capabilities. Disabling Media Sharing helps prevent the...
V-259517 Medium The macOS system must disable TouchID for unlocking the device. TouchID enables the ability to unlock a macOS system with a user's fingerprint. TouchID must be disabled for "Unlocking your Mac" on all macOS devices that are capable of using TouchID. The system must remain locked until the user establishes access using an authorized identification and authentication method.
V-259516 Medium The macOS system must disable Airplay Receiver. Airplay Receiver allows users to send content from another Apple device to be displayed on the screen as it is being played from another device. Support for Airplay Receiver is nonessential and must be disabled. The information system must be configured to provide only essential capabilities. Satisfies: SRG-OS-000095-GPOS-00049,SRG-OS-000300-GPOS-00118
V-259514 Medium The macOS system must secure user's home folders. The system must be configured to prevent access to other user's home folders. The default behavior of macOS is to allow all valid users access to the top level of every other user's home folder while restricting access only to the Apple default folders within.
V-259513 Medium The macOS system must disable unattended or automatic log on to the system. Automatic logon must be disabled. When automatic logons are enabled, the default user account is automatically logged on at boot time without prompting the user for a password. Even if the screen is later locked, a malicious user would be able to reboot the computer and find it already logged...
V-259511 Medium The macOS system must disable the guest account. Guest access must be disabled. Turning off guest access prevents anonymous users from accessing files.
V-259508 Medium The macOS system must disable the system settings pane for Siri. The System Settings pane for Siri must be hidden. Hiding the System Settings pane prevents the users from configuring Siri.
V-259507 Medium The macOS system must disable the System Settings pane for Wallet and Apple Pay. The System Settings pane for Wallet and Apple Pay must be disabled. Disabling the System Settings pane prevents the users from configuring Wallet and Apple Pay.
V-259506 Medium The macOS system must disable the TouchID System Settings pane. The System Settings pane for TouchID must be disabled. Disabling the System Settings pane prevents the users from configuring TouchID.
V-259505 Medium The macOS system must disable Screen Sharing and Apple Remote Desktop. Support for both Screen Sharing and Apple Remote Desktop (ARD) is nonessential and must be disabled. The information system must be configured to provide only essential capabilities. Disabling screen sharing and ARD helps prevent the unauthorized connection of devices, the unauthorized transfer of information, and unauthorized tunneling.
V-259504 Medium The macOS system must disable iCloud Photo Library. The macOS built-in Photos.app connection to Apple's iCloud service must be disabled. Apple's iCloud service does not provide an organization with enough control over the storage and access of data and, therefore, automated photo synchronization must be controlled by an organization approved service.
V-259503 Medium The macOS system must disable iCloud Bookmarks. The macOS built-in Safari.app bookmark synchronization via the iCloud service must be disabled. Apple's iCloud service does not provide an organization with enough control over the storage and access of data and, therefore, automated bookmark synchronization must be controlled by an organization approved service.
V-259502 Medium The macOS system must disable iCloud Document synchronization. The macOS built-in iCloud document synchronization service must be disabled to prevent organizational data from being synchronized to personal or nonapproved storage. Apple's iCloud service does not provide an organization with enough control over the storage and access of data and, therefore, automated document synchronization must be controlled by an...
V-259501 Medium The macOS system must disable iCloud Keychain synchronization. The macOS system's ability to automatically synchronize a user's passwords to their iCloud account must be disabled. Apple's iCloud service does not provide an organization with enough control over the storage and access of data and, therefore, password management and synchronization must be controlled by an organization approved service.
V-259500 Medium The macOS system must disable Siri Setup during Setup Assistant. The prompt for Siri during Setup Assistant must be disabled. Organizations must apply organizationwide configuration settings. The macOS Siri Assistant Setup prompt guides new users through enabling their own specific Siri settings; this is not essential and, therefore, must be disabled to prevent against the risk of individuals electing Siri...
V-259498 Medium The macOS system must disable iCloud Storage Setup during Setup Assistant. The prompt to set up iCloud storage services during Setup Assistant must be disabled. The default behavior of macOS is to prompt new users to set up storage in iCloud. Disabling the iCloud storage setup prompt provides organizations more control over the storage of their data.
V-259497 Medium The macOS system must disable Privacy Setup services during Setup Assistant. The prompt for Privacy Setup services during Setup Assistant must be disabled. Organizations must apply organizationwide configuration settings. The macOS Privacy Setup services prompt guides new users through enabling their own specific privacy settings; this is not essential and, therefore, must be disabled to prevent against the risk of individuals...
V-259496 Medium The macOS system must disable Apple ID setup during Setup Assistant. The prompt for Apple ID setup during Setup Assistant must be disabled. macOS will automatically prompt new users to set up an Apple ID while they are going through Setup Assistant if this is not disabled, misleading new users to think they need to create Apple ID accounts upon their...
V-259495 Medium The macOS system must disable Remote Apple Events. If the system does not require Remote Apple Events, support for Apple Remote Events is nonessential and must be disabled. The information system must be configured to provide only essential capabilities. Disabling Remote Apple Events helps prevent the unauthorized connection of devices, the unauthorized transfer of information, and unauthorized tunneling....
V-259494 Medium The macOS system must disable sending diagnostic and usage data to Apple. The ability to submit diagnostic data to Apple must be disabled. The information system must be configured to provide only essential capabilities. Disabling the submission of diagnostic and usage information will mitigate the risk of unwanted data being sent to Apple. Satisfies: SRG-OS-000205-GPOS-00083,SRG-OS-000206-GPOS-00084
V-259493 Medium The macOS system must disable Siri. Support for Siri is nonessential and must be disabled. The information system must be configured to provide only essential capabilities.
V-259492 Medium The macOS system must disable the camera. macOS must be configured to disable the camera.
V-259491 Medium The macOS system must disable iCloud Notes. The macOS built-in Notes.app connection to Apple's iCloud service must be disabled. Apple's iCloud service does not provide an organization with enough control over the storage and access of data and, therefore, automated Notes synchronization must be controlled by an organization approved service.
V-259490 Medium The macOS system must disable iCloud Mail. The macOS built-in Mail.app connection to Apple's iCloud service must be disabled. Apple's iCloud service does not provide an organization with enough control over the storage and access of data and, therefore, automated mail synchronization must be controlled by an organization approved service.
V-259489 Medium The macOS system must disable iCloud Address Book. The macOS built-in Contacts.app connection to Apple's iCloud service must be disabled. Apple's iCloud service does not provide an organization with enough control over the storage and access of data, and, therefore, automated contact synchronization must be controlled by an organization approved service.
V-259488 Medium The macOS system must disable iCloud Reminders. The macOS built-in Reminders.app connection to Apple's iCloud service must be disabled. Apple's iCloud service does not provide an organization with enough control over the storage and access of data and, therefore, automated reminders synchronization must be controlled by an organization approved service.
V-259487 Medium The macOS system must disable the iCloud Calendar services. The macOS built-in Calendar.app connection to Apple's iCloud service must be disabled. Apple's iCloud service does not provide an organization with enough control over the storage and access of data and, therefore, automated calendar synchronization must be controlled by an organization approved service.
V-259486 Medium The macOS system must disable FaceTime.app. The macOS built-in FaceTime.app must be disabled. The FaceTime.app establishes a connection to Apple's iCloud service, even when security controls have been put in place to disable iCloud access. [IMPORTANT] ==== Apple has deprecated the use of application restriction controls (https://github.com/apple/device-management/blob/eb51fb0cb9626cac4717858556912c257a734ce0/mdm/profiles/com.apple.applicationaccess.new.yaml#L67-L70). Using these controls may not work as expected. Third-party...
V-259485 Medium The macOS system must disable AirDrop. AirDrop must be disabled to prevent file transfers to or from unauthorized devices. AirDrop allows users to share and receive files from other nearby Apple devices. Satisfies: SRG-OS-000080-GPOS-00048,SRG-OS-000095-GPOS-00049,SRG-OS-000300-GPOS-00118
V-259484 Medium The macOS system must disable the built-in web server. The built-in web server is a nonessential service built into macOS and must be disabled. Note: The built in web server service is disabled at startup by default macOS.
V-259483 Medium The macOS system must disable Internet Sharing. If the system does not require Internet Sharing, support for it is nonessential and must be disabled. The information system must be configured to provide only essential capabilities. Disabling Internet sharing helps prevent the unauthorized connection of devices, unauthorized transfer of information, and unauthorized tunneling.
V-259482 Medium The macOS system must disable Unix-to-Unix Copy Protocol service. The system must not have the Unix-to-Unix Copy Protocol (UUCP) service active. UUCP, a set of programs that enable the sending of files between different Unix systems as well as sending commands to be executed on another system, is not essential and must be disabled in order to prevent the...
V-259481 Medium The macOS system must disable Bonjour multicast. Bonjour multicast advertising must be disabled to prevent the system from broadcasting its presence and available services over network interfaces.
V-259480 Medium The macOS system must disable Location Services. The information system must be configured to provide only essential capabilities. Disabling Location Services helps prevent the unauthorized connection of devices, unauthorized transfer of information, and unauthorized tunneling.
V-259479 Medium The macOS system must disable Network File System service. Support for Network File Systems (NFS) services is nonessential and, therefore, must be disabled.
V-259478 Medium The macOS system must disable Server Message Block sharing. Support for Server Message Block (SMB) file sharing is nonessential and must be disabled. The information system must be configured to provide only essential capabilities.
V-259476 Medium The macOS system must configure audit_control to not contain access control lists. /etc/security/audit_control must not contain Access Control Lists (ACLs). /etc/security/audit_control contains sensitive configuration data about the audit service. This rule ensures that the audit service is configured to be readable and writable only by system administrators in order to prevent normal users from manipulating audit logs. Satisfies: SRG-OS-000057-GPOS-00027,SRG-OS-000058-GPOS-00028,SRG-OS-000059-GPOS-00029,SRG-OS-000063-GPOS-00032,SRG-OS-000256-GPOS-00097,SRG-OS-000257-GPOS-00098,SRG-OS-000258-GPOS-00099
V-259475 Medium The macOS system must configure audit_control to mode 440 or less permissive. /etc/security/audit_control must be configured so that it is readable only by the root user and group wheel. Satisfies: SRG-OS-000057-GPOS-00027,SRG-OS-000058-GPOS-00028,SRG-OS-000059-GPOS-00029,SRG-OS-000063-GPOS-00032,SRG-OS-000256-GPOS-00097,SRG-OS-000257-GPOS-00098,SRG-OS-000258-GPOS-00099
V-259474 Medium The macOS system must configure audit_control owner to root. /etc/security/audit_control must have the owner set to root. The audit service must be configured with the correct ownership to prevent normal users from manipulation audit log configurations. Audit logs contain sensitive data about the system and users. If log files are set to be readable and writable only by system...
V-259473 Medium The macOS system must configure audit_control group to wheel. /etc/security/audit_control must have the group set to wheel. The audit service must be configured with the correct group ownership to prevent normal users from manipulation audit log configurations. Audit logs contain sensitive data about the system and users. If log files are set to be readable and writable only by...
V-259472 Medium The macOS system must disable root logon for SSH. If SSH is enabled to ensure individual accountability and prevent unauthorized access, logging in as root via SSH must be disabled. The macOS system must require individuals to be authenticated with an individual authenticator prior to using a group authenticator, and administrator users must never log in directly as root....
V-259471 Medium The macOS system must set smart card certificate trust to moderate. The macOS system must be configured to block access to users who are no longer authorized (i.e., users with revoked certificates). To prevent the use of untrusted certificates, the certificates on a smart card must meet the following criteria: its issuer has a system-trusted certificate, the certificate is not expired,...
V-259470 Medium The macOS system must configure the system to audit all authorization and authentication events. The auditing system must be configured to flag authorization and authentication (aa) events. Authentication events contain information about the identity of a user, server, or client. Authorization events contain information about permissions, rights, and rules. If audit records do not include aa events, it is difficult to identify incidents and...
V-259469 Medium The macOS system must configure audit failure notification. The audit service must be configured to immediately print messages to the console or email administrator users when an auditing failure occurs. It is critical for the appropriate personnel to be made aware immediately if a system is at risk of failing to process audit logs as required. Without a...
V-259468 Medium The macOS system must configure audit capacity warning. The audit service must be configured to notify the system administrator when the amount of free disk space remaining reaches an organization defined value. This rule ensures that the system administrator is notified in advance that action is required to free up more disk space for audit logs. Satisfies: SRG-OS-000046-GPOS-00022,SRG-OS-000343-GPOS-00134
V-259466 Medium The macOS system must be configured to audit all failed program execution on the system. The audit system must be configured to record enforcement actions of access restrictions, including failed program execute (-ex) attempts. Enforcement actions are the methods or mechanisms used to prevent unauthorized access and/or changes to configuration settings. One common and effective enforcement action method is using program execution restrictions (e.g., denying...
V-259465 Medium The macOS system must be configured to audit all failed write actions on the system. The audit system must be configured to record enforcement actions of access restrictions, including failed file write (-fw) attempts. Enforcement actions are the methods or mechanisms used to prevent unauthorized access and/or changes to configuration settings. One common and effective enforcement action method is using access restrictions (e.g., denying users...
V-259464 Medium The macOS system must be configured to audit all failed read actions on the system. The audit system must be configured to record enforcement actions of access restrictions, including failed file read (-fr) attempts. Enforcement actions are the methods or mechanisms used to prevent unauthorized access and/or changes to configuration settings. One common and effective enforcement action method is using access restrictions (e.g., denying access...
V-259463 Medium The macOS system must be configured to audit all changes of object attributes. The audit system must be configured to record enforcement actions of attempts to modify file attributes (fm). Enforcement actions are the methods or mechanisms used to prevent unauthorized changes to configuration settings. One common and effective enforcement action method is using access restrictions (i.e., modifications to a file by applying...
V-259462 Medium The macOS system must be configured to audit all deletions of object attributes. The audit system must be configured to record enforcement actions of attempts to delete file attributes (fd). ***Enforcement actions are the methods or mechanisms used to prevent unauthorized changes to configuration settings. One common and effective enforcement action method is using access restrictions (i.e., denying modifications to a file by...
V-259461 Medium The macOS system must configure audit log folders to mode 700 or less permissive. The audit log folder must be configured to mode 700 or less permissive so that only the root user is able to read, write, and execute changes to folders. Because audit logs contain sensitive data about the system and users, the audit service must be configured to mode 700 or...
V-259460 Medium The macOS system must configure audit log files to mode 440 or less permissive. The audit service must be configured to create log files that are readable only by the root user and group wheel. To achieve this, audit log files must be configured to mode 440 or less permissive; thereby preventing normal users from reading, modifying, or deleting audit logs. Satisfies: SRG-OS-000057-GPOS-00027,SRG-OS-000058-GPOS-00028,SRG-OS-000059-GPOS-00029,SRG-OS-000256-GPOS-00097,SRG-OS-000257-GPOS-00098,SRG-OS-000258-GPOS-00099
V-259459 Medium The macOS system must configure audit log folders group to wheel. Audit log folders must have the group set to wheel. The audit service must be configured to create log files with the correct group ownership to prevent normal users from reading audit logs. Audit logs contain sensitive data about the system and users. If log files are set to be...
V-259458 Medium The macOS system must configure audit log files group to wheel. Audit log files must have the group set to wheel. The audit service must be configured to create log files with the correct group ownership to prevent normal users from reading audit logs. Audit logs contain sensitive data about the system and users. If log files are set to be...
V-259457 Medium The macOS system must configure audit log folders to be owned by root. Audit log folders must be owned by root. The audit service must be configured to create log folders with the correct ownership to prevent normal users from reading audit logs. Audit logs contain sensitive data about the system and users. If log folders are set to only be readable and...
V-259456 Medium The macOS system must configure audit log files to be owned by root. Audit log files must be owned by root. The audit service must be configured to create log files with the correct ownership to prevent normal users from reading audit logs. Audit logs contain sensitive data about the system and users. If log files are set to only be readable and...
V-259455 Medium The macOS system must configure system to shut down upon audit failure. The audit service must be configured to shut down the computer if it is unable to audit system events. Once audit failure occurs, user and system activity are no longer recorded, and malicious activity could go undetected. Audit processing failures can occur due to software/hardware errors, failures in the audit...
V-259454 Medium The macOS system must enable security auditing. Audit records establish what types of events have occurred, when they occurred, and which users were involved. These records aid an organization in their efforts to establish, correlate, and investigate the events leading up to an outage or attack. The content required to be captured in an audit record varies...
V-259453 Medium The macOS system must be configured to audit all log on and log out events. The audit system must be configured to record all attempts to log in and out of the system (lo). Frequently, an attacker that successfully gains access to a system has only gained access to an account with limited privileges, such as a guest account or a service account. The attacker...
V-259452 Medium The macOS system must be configured to audit all administrative action events. Administrative action events include changes made to the system (e.g., modifying authentication policies). If audit records do not include "ad" events, it is difficult to identify incidents and to correlate incidents to subsequent events. Audit records can be generated from various components within the information system (e.g., via a module...
V-259451 Medium The macOS system must enable time synchronization daemon. The macOS time synchronization daemon (timed) must be enabled for proper time synchronization to an authorized time server. Note: The time synchronization daemon is enabled by default on macOS. Satisfies: SRG-OS-000355-GPOS-00143,SRG-OS-000356-GPOS-00144
V-259450 Medium The macOS system must be configured to use an authorized time server. Approved time servers must be the only servers configured for use. This rule ensures the uniformity of time stamps for information systems with multiple system clocks and systems connected over a network. An authoritative time server is synchronized with redundant United States Naval Observatory (USNO) time servers as designated for...
V-259449 Medium The macOS system must enforce auto logout after 86400 seconds of inactivity. Auto logout must be configured to automatically terminate a user session and log out the after 86400 seconds of inactivity. Note: The maximum that macOS can be configured for autologoff is 86400 seconds. [IMPORTANT] ==== The automatic logout may cause disruptions to an organization's workflow and/or loss of data. Information...
V-259448 Medium The macOS system must set SSH Active Server Alive Maximum to 0. SSH must be configured with an Active Server Alive Maximum Count set to 0. Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take control of a management session enabled on the console or console port that has been left unattended....
V-259447 Medium The macOS system must configure SSHD unused connection timeout to 900. If SSHD is enabled, it must be configured with unused connection timeout set to 900. This will set the timeout when there are no open channels within a session. Note: /etc/ssh/sshd_config will be automatically modified to its original state following any update or major upgrade to the operating system. Satisfies:...
V-259446 Medium The macOS system must configure SSHD Channel Timeout to 900. If SSHD is enabled it must be configured with session Channel Timeout set to 900. This will set the time out when the session is inactive. Note: /etc/ssh/sshd_config will be automatically modified to its original state following any update or major upgrade to the operating system. Satisfies: SRG-OS-000163-GPOS-00072,SRG-OS-000279-GPOS-00109
V-259445 Medium The macOS system must configure SSH ServerAliveInterval option set to 900. SSH must be configured with an Active Server Alive Maximum Count set to 900. Setting the Active Server Alive Maximum Count to 900 will log users out after a 900-second interval of inactivity. Note: /etc/ssh/ssh_config will be automatically modified to its original state following any update or major upgrade to...
V-259444 Medium The macOS system must disable root logon. To ensure individual accountability and prevent unauthorized access, logging in as root at the login window must be disabled. The macOS system must require individuals to be authenticated with an individual authenticator prior to using a group authenticator, and administrator users must never log in directly as root. Satisfies: SRG-OS-000104-GPOS-00051,SRG-OS-000109-GPOS-00056,SRG-OS-000364-GPOS-00151
V-259443 Medium The macOS system must disable logon to other user's active and locked sessions. The ability to log in to another user's active or locked session must be disabled. macOS has a privilege that can be granted to any user that will allow that user to unlock active user's sessions. Disabling the admins and/or user's ability to log into another user's active and locked...
V-259441 Medium The macOS system must enforce screen saver timeout. The screen saver timeout must be set to 900 seconds or a shorter length of time. This rule ensures that a full session lock is triggered within no more than 900 seconds of inactivity.
V-259440 Medium The macOS system must set account lockout time to 15 minutes. The macOS must be configured to enforce a lockout time period of at least 15 minutes when the maximum number of failed logon attempts is reached. This rule protects against malicious users attempting to gain access to the system via brute-force hacking methods. Satisfies: SRG-OS-000021-GPOS-00005,SRG-OS-000329-GPOS-00128
V-259437 Medium The macOS system must set Login Grace Time to 30. If SSHD is enabled, then it must be configured to wait only 30 seconds before timing out logon attempts. Note: /etc/ssh/sshd_config will be automatically modified to its original state following any update or major upgrade to the operating system.
V-259436 Medium The macOS system must configure SSHD ClientAliveCountMax to 1. If SSHD is enabled it must be configured with the Client Alive Maximum Count set to 1. This will set the number of client alive messages which may be sent without the SSH server receiving any messages back from the client. If this threshold is reached while client alive messages...
V-259435 Medium The macOS system must configure SSHD ClientAliveInterval to 900. If SSHD is enabled, then it must be configured with the Client Alive Interval set to 900. Sets a timeout interval in seconds after which if no data has been received from the client, sshd(8) will send a message through the encrypted channel to request a response from the client....
V-259434 Medium The macOS system must disable FileVault automatic log on. If FileVault is enabled, automatic log on must be disabled, so that both FileVault and login window authentication are required. The default behavior of macOS when FileVault is enabled is to automatically log on to the computer once successfully passing user's FileVault credentials. Note: DisableFDEAutoLogin does not have to be...
V-259433 Medium The macOS system must configure audit log folders to not contain access control lists. The audit log folder must not contain access control lists (ACLs). Audit logs contain sensitive data about the system and users. This rule ensures that the audit service is configured to create log folders that are readable and writable only by system administrators in order to prevent normal users from...
V-259432 Medium The macOS system must configure audit log files to not contain access control lists. The audit log files must not contain access control lists (ACLs). This rule ensures that audit information and audit files are configured to be readable and writable only by system administrators, thereby preventing unauthorized access, modification, and deletion of files. Satisfies: SRG-OS-000057-GPOS-00027,SRG-OS-000058-GPOS-00028,SRG-OS-000059-GPOS-00029,SRG-OS-000256-GPOS-00097,SRG-OS-000257-GPOS-00098,SRG-OS-000258-GPOS-00099
V-259431 Medium The macOS system must display the Standard Mandatory DOD Notice and Consent Banner at the login window. Displaying a standardized and approved use notification before granting access to the operating system ensures that users are provided with privacy and security notification verbiage that is consistent with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance. System use notifications are required only for access via logon...
V-259430 Medium The macOS system must enforce SSH to display the Standard Mandatory DOD Notice and Consent Banner. Displaying a standardized and approved use notification before granting access to the operating system ensures that users are provided with privacy and security notification verbiage that is consistent with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance. System use notifications are required only for access via logon...
V-259429 Medium The macOS system must display the Standard Mandatory DOD Notice and Consent Banner at remote log on. Displaying a standardized and approved use notification before granting access to the operating system ensures that users are provided with privacy and security notification verbiage that is consistent with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance. System use notifications are required only for access via logon...
V-259428 Medium The macOS system must limit consecutive failed log on attempts to three. The macOS must be configured to limit the number of failed log on attempts to a maximum of three. When the maximum number of failed attempts is reached, the account must be locked for a period of time after. This rule protects against malicious users attempting to gain access to...
V-259425 Medium The macOS system must enforce time synchronization. Time synchronization must be enforced on all networked systems. This rule ensures the uniformity of time stamps for information systems with multiple system clocks and systems connected over a network. Satisfies: SRG-OS-000355-GPOS-00143,SRG-OS-000356-GPOS-00144
V-259424 Medium The macOS system must automatically remove or disable temporary or emergency user accounts within 72 hours. The macOS is able to be configured to set an automated termination for 72 hours or less for all temporary or emergency accounts upon account creation. Emergency administrator accounts are privileged accounts established in response to crisis situations where the need for rapid account activation is required. Therefore, emergency account...
V-259423 Medium The macOS system must prevent AdminHostInfo from being available at LoginWindow. The system must be configured to not display sensitive information at the LoginWindow. The key AdminHostInfo when configured will allow the HostName, IP Address, and operating system version and build to be displayed.
V-259422 Medium The macOS system must disable hot corners. Hot corners must be disabled. The information system conceals, via the session lock, information previously visible on the display with a publicly viewable image. Although hot corners can be used to initiate a session lock or to launch useful applications, they can also be configured to disable an automatic session...
V-259421 Medium The macOS system must configure user session lock when a smart token is removed. The screen lock must be configured to initiate automatically when the smart token is removed from the system. Session locks are temporary actions taken when users stop work and move away from the immediate vicinity of the information system but do not want to log out because of the temporary...
V-259420 Medium The macOS system must enforce session lock no more than five seconds after screen saver is started. A screen saver must be enabled and the system must be configured to require a password to unlock once the screensaver has been on for a maximum of five seconds. An unattended system with an excessive grace period is vulnerable to a malicious user.
V-259419 Medium The macOS system must enforce screen saver password. Users must authenticate when unlocking the screen saver. The screen saver acts as a session lock and prevents unauthorized users from accessing the current user's account.
V-259418 Medium The macOS system must prevent Apple Watch from terminating a session lock. Disabling Apple watches is a necessary step to ensuring that the information system retains a session lock until the user reestablishes access using authorized identification and authentication procedures.
V-259558 Low The macOS system must configure install.log retention to 365. The install.log must be configured to require records be kept for an organizational-defined value before deletion, unless the system uses a central audit record storage facility.
V-259467 Low The macOS system must configure audit retention to seven days. The audit service must be configured to require records be kept for an organizational defined value before deletion, unless the system uses a central audit record storage facility. When "expire-after" is set to "7d", the audit service will not delete audit logs until the log data criteria is met.