UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The macOS system must disable iCloud Private Relay.


Overview

Finding ID Version Rule ID IA Controls Severity
V-259525 APPL-14-002170 SV-259525r958478_rule Medium
Description
Enterprise networks may be required to audit all network traffic by policy; therefore, iCloud Private Relay must be disabled. Network administrators can also prevent the use of this feature by blocking DNS resolution of mask.icloud.com and mask-h2.icloud.com.
STIG Date
Apple macOS 14 (Sonoma) Security Technical Implementation Guide 2024-05-30

Details

Check Text ( C-63264r941195_chk )
Verify the macOS system is configured to disable the iCloud Private Relay with the following command:

/usr/bin/osascript -l JavaScript << EOS
$.NSUserDefaults.alloc.initWithSuiteName('com.apple.applicationaccess')\
.objectForKey('allowCloudPrivateRelay').js
EOS

If the result is not "false", this is a finding.
Fix Text (F-63172r941196_fix)
Configure the macOS system to disable the iCloud Private Relay by installing the "com.apple.applicationaccess" configuration profile.