DISA STIG Apple Mac OSX 10.14 v2r6

Audit Details

Name: DISA STIG Apple Mac OSX 10.14 v2r6

Updated: 4/12/2023

Authority: DISA STIG

Plugin: Unix

Revision: 1.3

Estimated Item Count: 157

File Details

Filename: DISA_STIG_Apple_OS_X_10.14_v2r6.audit

Size: 347 kB

MD5: 4657c4fc799da5ffb52ab4bc25150ce4
SHA256: 90d2c683b03e97272df992277940079a66df688002dbf43f69a9d725b5941392

Audit Items

DescriptionCategories
AOSX-14-000001 - The macOS system must be configured to prevent Apple Watch from terminating a session lock.

ACCESS CONTROL

AOSX-14-000002 - The macOS system must retain the session lock until the user reestablishes access using established identification and authentication procedures.

ACCESS CONTROL

AOSX-14-000003 - The macOS system must initiate the session lock no more than five seconds after a screen saver is started.

ACCESS CONTROL

AOSX-14-000004 - The macOS system must initiate a session lock after a 15-minute period of inactivity.

ACCESS CONTROL

AOSX-14-000005 - The macOS system must be configured to lock the user session when a smart token is removed.

ACCESS CONTROL

AOSX-14-000006 - The macOS system must conceal, via the session lock, information previously visible on the display with a publicly viewable image.

ACCESS CONTROL

AOSX-14-000007 - The macOS system must be configured to disable hot corners - bottom left

ACCESS CONTROL

AOSX-14-000007 - The macOS system must be configured to disable hot corners - bottom right

ACCESS CONTROL

AOSX-14-000007 - The macOS system must be configured to disable hot corners - top left

ACCESS CONTROL

AOSX-14-000007 - The macOS system must be configured to disable hot corners - top right

ACCESS CONTROL

AOSX-14-000008 - The macOS system must be configured with Wi-Fi support software disabled.

ACCESS CONTROL

AOSX-14-000011 - The macOS system must implement DoD-approved encryption to protect the confidentiality and integrity of remote access sessions including transmitted data and data during preparation for transmission - OpenSSH version

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

AOSX-14-000011 - The macOS system must implement DoD-approved encryption to protect the confidentiality and integrity of remote access sessions including transmitted data and data during preparation for transmission - SSHD currently running

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

AOSX-14-000011 - The macOS system must implement DoD-approved encryption to protect the confidentiality and integrity of remote access sessions including transmitted data and data during preparation for transmission - SSHD service disabled

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

AOSX-14-000012 - The macOS system must automatically remove or disable temporary user accounts after 72 hours.

ACCESS CONTROL

AOSX-14-000013 - The macOS system must automatically remove or disable emergency accounts after the crisis is resolved or within 72 hours.

ACCESS CONTROL

AOSX-14-000014 - The macOS system must, for networked systems, compare internal information system clocks at least every 24 hours with a server that is synchronized to one of the redundant United States Naval Observatory (USNO) time servers or a time server designated for the appropriate DoD network (NIPRNet/SIPRNet) and/or the Global Positioning System (GPS) - Network Time On

AUDIT AND ACCOUNTABILITY

AOSX-14-000014 - The macOS system must, for networked systems, compare internal information system clocks at least every 24 hours with a server that is synchronized to one of the redundant United States Naval Observatory (USNO) time servers or a time server designated for the appropriate DoD network (NIPRNet/SIPRNet) and/or the Global Positioning System (GPS) - Network Time Server

AUDIT AND ACCOUNTABILITY

AOSX-14-000015 - The macOS system must utilize an HBSS solution and implement all DoD required modules.

SYSTEM AND INFORMATION INTEGRITY

AOSX-14-000016 - The macOS system must be integrated into a directory services infrastructure.

CONFIGURATION MANAGEMENT

AOSX-14-000020 - The macOS system must enforce the limit of three consecutive invalid logon attempts by a user.

ACCESS CONTROL

AOSX-14-000021 - The macOS system must enforce an account lockout time period of 15 minutes in which a user makes three consecutive invalid logon attempts.

ACCESS CONTROL

AOSX-14-000022 - The macOS system must enforce the limit of three consecutive invalid logon attempts by a user before the user account is locked.

ACCESS CONTROL

AOSX-14-000023 - The macOS system must display the Standard Mandatory DoD Notice and Consent Banner before granting remote access to the operating system.

ACCESS CONTROL

AOSX-14-000024 - The macOS system must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the system via SSH.

ACCESS CONTROL

AOSX-14-000025 - The macOS system must be configured so that any connection to the system must display the Standard Mandatory DoD Notice and Consent Banner before granting GUI access to the system - Banner file

ACCESS CONTROL

AOSX-14-000025 - The macOS system must be configured so that any connection to the system must display the Standard Mandatory DoD Notice and Consent Banner before granting GUI access to the system - Banner text

ACCESS CONTROL

AOSX-14-000030 - The macOS system must be configured so that log files must not contain access control lists (ACLs).

AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

AOSX-14-000031 - The macOS system must be configured so that log folders must not contain access control lists (ACLs).

AUDIT AND ACCOUNTABILITY

AOSX-14-000032 - The macOS system must be configured with dedicated user accounts to decrypt the hard disk upon startup - AuthenticationAuthority

ACCESS CONTROL

AOSX-14-000032 - The macOS system must be configured with dedicated user accounts to decrypt the hard disk upon startup - DisableFDEAutologin

ACCESS CONTROL

AOSX-14-000032 - The macOS system must be configured with dedicated user accounts to decrypt the hard disk upon startup - FileVault User

ACCESS CONTROL

AOSX-14-000040 - The macOS system must use replay-resistant authentication mechanisms and implement cryptographic mechanisms to protect the integrity of and verify remote disconnection at the termination of nonlocal maintenance and diagnostic communications, when used for nonlocal maintenance sessions - OpenSSH Version

IDENTIFICATION AND AUTHENTICATION, MAINTENANCE

AOSX-14-000040 - The macOS system must use replay-resistant authentication mechanisms and implement cryptographic mechanisms to protect the integrity of and verify remote disconnection at the termination of nonlocal maintenance and diagnostic communications, when used for nonlocal maintenance sessions - SSHD currently running

IDENTIFICATION AND AUTHENTICATION, MAINTENANCE

AOSX-14-000040 - The macOS system must use replay-resistant authentication mechanisms and implement cryptographic mechanisms to protect the integrity of and verify remote disconnection at the termination of nonlocal maintenance and diagnostic communications, when used for nonlocal maintenance sessions - SSHD service disabled

IDENTIFICATION AND AUTHENTICATION, MAINTENANCE

AOSX-14-000050 - The macOS system must limit the number of concurrent SSH sessions to 10 for all accounts and/or account types.

ACCESS CONTROL

AOSX-14-000051 - The macOS system must be configured with the SSH daemon ClientAliveInterval option set to 900 or less.

SYSTEM AND COMMUNICATIONS PROTECTION

AOSX-14-000052 - The macOS system must be configured with the SSH daemon ClientAliveCountMax option set to 0.

SYSTEM AND COMMUNICATIONS PROTECTION

AOSX-14-000053 - The macOS system must be configured with the SSH daemon LoginGraceTime set to 30 or less.

SYSTEM AND COMMUNICATIONS PROTECTION

AOSX-14-000054 - The macOS system must implement approved Ciphers to protect the confidentiality of SSH connections.

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE

AOSX-14-000055 - The macOS system must use only Message Authentication Codes (MACs) employing FIPS 140-2 validated cryptographic hash algorithms.

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE

AOSX-14-000056 - The macOS system must implement an approved Key Exchange Algorithm.

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE

AOSX-14-001001 - The macOS system must generate audit records for all account creations, modifications, disabling, and termination events; privileged activities or other system-level access; all kernel module load, unload, and restart actions; all program initiations; and organizationally defined events for all non-local maintenance and diagnostic sessions.

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, MAINTENANCE

AOSX-14-001002 - The macOS system must monitor remote access methods and generate audit records when successful/unsuccessful attempts to access/modify privileges occur.

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

AOSX-14-001003 - The macOS system must initiate session audits at system startup, using internal clocks with time stamps for audit records that meet a minimum granularity of one second and can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT).

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

AOSX-14-001010 - The macOS system must shut down by default upon audit failure (unless availability is an overriding concern).

AUDIT AND ACCOUNTABILITY

AOSX-14-001012 - The macOS system must be configured with audit log files owned by root.

AUDIT AND ACCOUNTABILITY

AOSX-14-001013 - The macOS system must be configured with audit log folders owned by root.

AUDIT AND ACCOUNTABILITY

AOSX-14-001014 - The macOS system must be configured with audit log files group-owned by wheel.

AUDIT AND ACCOUNTABILITY

AOSX-14-001015 - The macOS system must be configured with audit log folders group-owned by wheel.

AUDIT AND ACCOUNTABILITY