AOSX-14-000001 - The macOS system must be configured to prevent Apple Watch from terminating a session lock. | ACCESS CONTROL |
AOSX-14-000002 - The macOS system must retain the session lock until the user reestablishes access using established identification and authentication procedures. | ACCESS CONTROL |
AOSX-14-000003 - The macOS system must initiate the session lock no more than five seconds after a screen saver is started. | ACCESS CONTROL |
AOSX-14-000004 - The macOS system must initiate a session lock after a 15-minute period of inactivity. | ACCESS CONTROL |
AOSX-14-000005 - The macOS system must be configured to lock the user session when a smart token is removed. | ACCESS CONTROL |
AOSX-14-000006 - The macOS system must conceal, via the session lock, information previously visible on the display with a publicly viewable image. | ACCESS CONTROL |
AOSX-14-000007 - The macOS system must be configured to disable hot corners - bottom left | ACCESS CONTROL |
AOSX-14-000007 - The macOS system must be configured to disable hot corners - bottom right | ACCESS CONTROL |
AOSX-14-000007 - The macOS system must be configured to disable hot corners - top left | ACCESS CONTROL |
AOSX-14-000007 - The macOS system must be configured to disable hot corners - top right | ACCESS CONTROL |
AOSX-14-000008 - The macOS system must be configured with Wi-Fi support software disabled. | ACCESS CONTROL |
AOSX-14-000011 - The macOS system must implement DoD-approved encryption to protect the confidentiality and integrity of remote access sessions including transmitted data and data during preparation for transmission - OpenSSH version | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
AOSX-14-000011 - The macOS system must implement DoD-approved encryption to protect the confidentiality and integrity of remote access sessions including transmitted data and data during preparation for transmission - SSHD currently running | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
AOSX-14-000011 - The macOS system must implement DoD-approved encryption to protect the confidentiality and integrity of remote access sessions including transmitted data and data during preparation for transmission - SSHD service disabled | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
AOSX-14-000012 - The macOS system must automatically remove or disable temporary user accounts after 72 hours. | ACCESS CONTROL |
AOSX-14-000013 - The macOS system must automatically remove or disable emergency accounts after the crisis is resolved or within 72 hours. | ACCESS CONTROL |
AOSX-14-000014 - The macOS system must, for networked systems, compare internal information system clocks at least every 24 hours with a server that is synchronized to one of the redundant United States Naval Observatory (USNO) time servers or a time server designated for the appropriate DoD network (NIPRNet/SIPRNet) and/or the Global Positioning System (GPS) - Network Time On | AUDIT AND ACCOUNTABILITY |
AOSX-14-000014 - The macOS system must, for networked systems, compare internal information system clocks at least every 24 hours with a server that is synchronized to one of the redundant United States Naval Observatory (USNO) time servers or a time server designated for the appropriate DoD network (NIPRNet/SIPRNet) and/or the Global Positioning System (GPS) - Network Time Server | AUDIT AND ACCOUNTABILITY |
AOSX-14-000015 - The macOS system must utilize an HBSS solution and implement all DoD required modules. | SYSTEM AND INFORMATION INTEGRITY |
AOSX-14-000016 - The macOS system must be integrated into a directory services infrastructure. | CONFIGURATION MANAGEMENT |
AOSX-14-000020 - The macOS system must enforce the limit of three consecutive invalid logon attempts by a user. | ACCESS CONTROL |
AOSX-14-000021 - The macOS system must enforce an account lockout time period of 15 minutes in which a user makes three consecutive invalid logon attempts. | ACCESS CONTROL |
AOSX-14-000022 - The macOS system must enforce the limit of three consecutive invalid logon attempts by a user before the user account is locked. | ACCESS CONTROL |
AOSX-14-000023 - The macOS system must display the Standard Mandatory DoD Notice and Consent Banner before granting remote access to the operating system. | ACCESS CONTROL |
AOSX-14-000024 - The macOS system must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the system via SSH. | ACCESS CONTROL |
AOSX-14-000025 - The macOS system must be configured so that any connection to the system must display the Standard Mandatory DoD Notice and Consent Banner before granting GUI access to the system - Banner file | ACCESS CONTROL |
AOSX-14-000025 - The macOS system must be configured so that any connection to the system must display the Standard Mandatory DoD Notice and Consent Banner before granting GUI access to the system - Banner text | ACCESS CONTROL |
AOSX-14-000030 - The macOS system must be configured so that log files must not contain access control lists (ACLs). | AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY |
AOSX-14-000031 - The macOS system must be configured so that log folders must not contain access control lists (ACLs). | AUDIT AND ACCOUNTABILITY |
AOSX-14-000032 - The macOS system must be configured with dedicated user accounts to decrypt the hard disk upon startup - AuthenticationAuthority | ACCESS CONTROL |
AOSX-14-000032 - The macOS system must be configured with dedicated user accounts to decrypt the hard disk upon startup - DisableFDEAutologin | ACCESS CONTROL |
AOSX-14-000032 - The macOS system must be configured with dedicated user accounts to decrypt the hard disk upon startup - FileVault User | ACCESS CONTROL |
AOSX-14-000040 - The macOS system must use replay-resistant authentication mechanisms and implement cryptographic mechanisms to protect the integrity of and verify remote disconnection at the termination of nonlocal maintenance and diagnostic communications, when used for nonlocal maintenance sessions - OpenSSH Version | IDENTIFICATION AND AUTHENTICATION, MAINTENANCE |
AOSX-14-000040 - The macOS system must use replay-resistant authentication mechanisms and implement cryptographic mechanisms to protect the integrity of and verify remote disconnection at the termination of nonlocal maintenance and diagnostic communications, when used for nonlocal maintenance sessions - SSHD currently running | IDENTIFICATION AND AUTHENTICATION, MAINTENANCE |
AOSX-14-000040 - The macOS system must use replay-resistant authentication mechanisms and implement cryptographic mechanisms to protect the integrity of and verify remote disconnection at the termination of nonlocal maintenance and diagnostic communications, when used for nonlocal maintenance sessions - SSHD service disabled | IDENTIFICATION AND AUTHENTICATION, MAINTENANCE |
AOSX-14-000050 - The macOS system must limit the number of concurrent SSH sessions to 10 for all accounts and/or account types. | ACCESS CONTROL |
AOSX-14-000051 - The macOS system must be configured with the SSH daemon ClientAliveInterval option set to 900 or less. | SYSTEM AND COMMUNICATIONS PROTECTION |
AOSX-14-000052 - The macOS system must be configured with the SSH daemon ClientAliveCountMax option set to 0. | SYSTEM AND COMMUNICATIONS PROTECTION |
AOSX-14-000053 - The macOS system must be configured with the SSH daemon LoginGraceTime set to 30 or less. | SYSTEM AND COMMUNICATIONS PROTECTION |
AOSX-14-000054 - The macOS system must implement approved Ciphers to protect the confidentiality of SSH connections. | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE |
AOSX-14-000055 - The macOS system must use only Message Authentication Codes (MACs) employing FIPS 140-2 validated cryptographic hash algorithms. | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE |
AOSX-14-000056 - The macOS system must implement an approved Key Exchange Algorithm. | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE |
AOSX-14-001001 - The macOS system must generate audit records for all account creations, modifications, disabling, and termination events; privileged activities or other system-level access; all kernel module load, unload, and restart actions; all program initiations; and organizationally defined events for all non-local maintenance and diagnostic sessions. | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, MAINTENANCE |
AOSX-14-001002 - The macOS system must monitor remote access methods and generate audit records when successful/unsuccessful attempts to access/modify privileges occur. | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
AOSX-14-001003 - The macOS system must initiate session audits at system startup, using internal clocks with time stamps for audit records that meet a minimum granularity of one second and can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT). | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
AOSX-14-001010 - The macOS system must shut down by default upon audit failure (unless availability is an overriding concern). | AUDIT AND ACCOUNTABILITY |
AOSX-14-001012 - The macOS system must be configured with audit log files owned by root. | AUDIT AND ACCOUNTABILITY |
AOSX-14-001013 - The macOS system must be configured with audit log folders owned by root. | AUDIT AND ACCOUNTABILITY |
AOSX-14-001014 - The macOS system must be configured with audit log files group-owned by wheel. | AUDIT AND ACCOUNTABILITY |
AOSX-14-001015 - The macOS system must be configured with audit log folders group-owned by wheel. | AUDIT AND ACCOUNTABILITY |