Item Search

NameAudit NamePluginCategory
AOSX-13-001195 - The macOS system must not accept source-routed IPv4 packets.DISA STIG Apple Mac OSX 10.13 v2r5Unix

CONFIGURATION MANAGEMENT

AOSX-13-001270 - The macOS system must be configured to disable Internet Sharing.DISA STIG Apple Mac OSX 10.13 v2r5Unix

CONFIGURATION MANAGEMENT

AOSX-13-002106 - The macOS system must be configured with system log files set to mode 640 or less permissive - aslDISA STIG Apple Mac OSX 10.13 v2r5Unix

SYSTEM AND INFORMATION INTEGRITY

AOSX-13-002106 - The macOS system must be configured with system log files set to mode 640 or less permissive - newsyslogDISA STIG Apple Mac OSX 10.13 v2r5Unix

SYSTEM AND INFORMATION INTEGRITY

AOSX-13-030014 - The macOS system must be configured to lock the user session when a smart token is removed.DISA STIG Apple Mac OSX 10.13 v2r5Unix

ACCESS CONTROL

AOSX-14-000004 - The macOS system must initiate a session lock after a 15-minute period of inactivity.DISA STIG Apple Mac OSX 10.14 v2r6Unix

ACCESS CONTROL

AOSX-14-000007 - The macOS system must be configured to disable hot corners - bottom leftDISA STIG Apple Mac OSX 10.14 v2r6Unix

ACCESS CONTROL

AOSX-14-000008 - The macOS system must be configured with Wi-Fi support software disabled.DISA STIG Apple Mac OSX 10.14 v2r6Unix

ACCESS CONTROL

AOSX-14-000011 - The macOS system must implement DoD-approved encryption to protect the confidentiality and integrity of remote access sessions including transmitted data and data during preparation for transmission - SSHD currently runningDISA STIG Apple Mac OSX 10.14 v2r6Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

AOSX-14-000014 - The macOS system must, for networked systems, compare internal information system clocks at least every 24 hours with a server that is synchronized to one of the redundant United States Naval Observatory (USNO) time servers or a time server designated for the appropriate DoD network (NIPRNet/SIPRNet) and/or the Global Positioning System (GPS) - Network Time OnDISA STIG Apple Mac OSX 10.14 v2r6Unix

AUDIT AND ACCOUNTABILITY

AOSX-14-000015 - The macOS system must utilize an HBSS solution and implement all DoD required modules.DISA STIG Apple Mac OSX 10.14 v2r6Unix

SYSTEM AND INFORMATION INTEGRITY

AOSX-14-000021 - The macOS system must enforce an account lockout time period of 15 minutes in which a user makes three consecutive invalid logon attempts.DISA STIG Apple Mac OSX 10.14 v2r6Unix

ACCESS CONTROL

AOSX-14-000031 - The macOS system must be configured so that log folders must not contain access control lists (ACLs).DISA STIG Apple Mac OSX 10.14 v2r6Unix

AUDIT AND ACCOUNTABILITY

AOSX-14-000040 - The macOS system must use replay-resistant authentication mechanisms and implement cryptographic mechanisms to protect the integrity of and verify remote disconnection at the termination of nonlocal maintenance and diagnostic communications, when used for nonlocal maintenance sessions - SSHD service disabledDISA STIG Apple Mac OSX 10.14 v2r6Unix

IDENTIFICATION AND AUTHENTICATION, MAINTENANCE

AOSX-14-000050 - The macOS system must limit the number of concurrent SSH sessions to 10 for all accounts and/or account types.DISA STIG Apple Mac OSX 10.14 v2r6Unix

ACCESS CONTROL

AOSX-14-000052 - The macOS system must be configured with the SSH daemon ClientAliveCountMax option set to 0.DISA STIG Apple Mac OSX 10.14 v2r6Unix

SYSTEM AND COMMUNICATIONS PROTECTION

AOSX-14-001002 - The macOS system must monitor remote access methods and generate audit records when successful/unsuccessful attempts to access/modify privileges occur.DISA STIG Apple Mac OSX 10.14 v2r6Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

AOSX-14-001010 - The macOS system must shut down by default upon audit failure (unless availability is an overriding concern).DISA STIG Apple Mac OSX 10.14 v2r6Unix

AUDIT AND ACCOUNTABILITY

AOSX-14-001020 - The macOS system must audit the enforcement actions used to restrict access associated with changes to the system.DISA STIG Apple Mac OSX 10.14 v2r6Unix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

AOSX-14-001060 - The macOS system must accept and verify Personal Identity Verification (PIV) credentials, implement a local cache of revocation data to support path discovery and validation in case of the inability to access revocation information via the network, and only allow the use of DoD PKI-established certificate authorities for verification of the establishment of protected sessions.DISA STIG Apple Mac OSX 10.14 v2r6Unix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

AOSX-14-002005 - The macOS system must be configured to disable Bonjour multicast advertising.DISA STIG Apple Mac OSX 10.14 v2r6Unix

CONFIGURATION MANAGEMENT

AOSX-14-002022 - The macOS system must be configured to disable Remote Apple Events.DISA STIG Apple Mac OSX 10.14 v2r6Unix

CONFIGURATION MANAGEMENT

AOSX-14-002032 - The macOS system must be configured to disable the system preference pane for Internet Accounts - DisabledPreferencePanesDISA STIG Apple Mac OSX 10.14 v2r6Unix

CONFIGURATION MANAGEMENT

AOSX-14-002040 - The macOS system must disable iCloud Keychain synchronization.DISA STIG Apple Mac OSX 10.14 v2r6Unix

CONFIGURATION MANAGEMENT

AOSX-14-002041 - The macOS system must disable iCloud document synchronization.DISA STIG Apple Mac OSX 10.14 v2r6Unix

CONFIGURATION MANAGEMENT

AOSX-14-002050 - The macOS system must disable the Screen Sharing feature.DISA STIG Apple Mac OSX 10.14 v2r6Unix

CONFIGURATION MANAGEMENT

AOSX-14-002053 - The macOS system must be configured to disable the system preference pane for Siri - DisabledPreferencePanesDISA STIG Apple Mac OSX 10.14 v2r6Unix

CONFIGURATION MANAGEMENT

AOSX-14-002053 - The macOS system must be configured to disable the system preference pane for Siri - HiddenPreferencePanesDISA STIG Apple Mac OSX 10.14 v2r6Unix

CONFIGURATION MANAGEMENT

AOSX-14-002054 - The macOS system must be configured with Bluetooth turned off unless approved by the organization - HiddenPreferencePanesDISA STIG Apple Mac OSX 10.14 v2r6Unix

SYSTEM AND COMMUNICATIONS PROTECTION

AOSX-14-002060 - The macOS system must allow only applications that have a valid digital signature to run - EnableAssessmentDISA STIG Apple Mac OSX 10.14 v2r6Unix

CONFIGURATION MANAGEMENT

AOSX-14-002068 - The macOS system must set permissions on user home directories to prevent users from having access to read or modify another users files - User directory groupsDISA STIG Apple Mac OSX 10.14 v2r6Unix

CONFIGURATION MANAGEMENT

AOSX-14-002068 - The macOS system must set permissions on user home directories to prevent users from having access to read or modify another users files - User subdirectory Access Control ListsDISA STIG Apple Mac OSX 10.14 v2r6Unix

CONFIGURATION MANAGEMENT

AOSX-14-003005 - The macOS system must map the authenticated identity to the user or group account for PKI-based authentication.DISA STIG Apple Mac OSX 10.14 v2r6Unix

IDENTIFICATION AND AUTHENTICATION

AOSX-14-003012 - The macOS system must be configured to prevent displaying password hints.DISA STIG Apple Mac OSX 10.14 v2r6Unix

CONFIGURATION MANAGEMENT

AOSX-14-003013 - macOS must be configured with a firmware password to prevent access to single user mode and booting from alternative media.DISA STIG Apple Mac OSX 10.14 v2r6Unix

CONFIGURATION MANAGEMENT

AOSX-14-003050 - The macOS system must be configured so that the login command requires smart card authentication.DISA STIG Apple Mac OSX 10.14 v2r6Unix

CONFIGURATION MANAGEMENT

AOSX-14-004021 - The macOS system must be configured with the sudoers file configured to authenticate users on a per -tty basis.DISA STIG Apple Mac OSX 10.14 v2r6Unix

CONFIGURATION MANAGEMENT

AOSX-14-005020 - The macOS system must implement cryptographic mechanisms to protect the confidentiality and integrity of all information at rest.DISA STIG Apple Mac OSX 10.14 v2r6Unix

SYSTEM AND COMMUNICATIONS PROTECTION

AOSX-15-000001 - The macOS system must be configured to prevent Apple Watch from terminating a session lock.DISA STIG Apple Mac OSX 10.15 v1r10Unix

ACCESS CONTROL

AOSX-15-000004 - The macOS system must initiate a session lock after a 15-minute period of inactivity.DISA STIG Apple Mac OSX 10.15 v1r10Unix

ACCESS CONTROL

AOSX-15-000007 - The macOS system must be configured to disable hot corners - bottom rightDISA STIG Apple Mac OSX 10.15 v1r10Unix

ACCESS CONTROL

AOSX-15-000007 - The macOS system must be configured to disable hot corners - top leftDISA STIG Apple Mac OSX 10.15 v1r10Unix

ACCESS CONTROL

AOSX-15-000023 - The macOS system must display the Standard Mandatory DoD Notice and Consent Banner before granting remote access to the operating system.DISA STIG Apple Mac OSX 10.15 v1r10Unix

ACCESS CONTROL

AOSX-15-000032 - The macOS system must be configured with dedicated user accounts to decrypt the hard disk upon startup - UserShellDISA STIG Apple Mac OSX 10.15 v1r10Unix

CONFIGURATION MANAGEMENT

AOSX-15-000056 - The macOS system must implement an approved Key Exchange Algorithm.DISA STIG Apple Mac OSX 10.15 v1r10Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE

AOSX-15-001002 - The macOS system must monitor remote access methods and generate audit records when successful/unsuccessful attempts to access/modify privileges occur.DISA STIG Apple Mac OSX 10.15 v1r10Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

AOSX-15-001013 - The macOS system must be configured with audit log folders owned by root.DISA STIG Apple Mac OSX 10.15 v1r10Unix

AUDIT AND ACCOUNTABILITY

AOSX-15-001017 - The macOS system must be configured with audit log folders set to mode 700 or less permissive.DISA STIG Apple Mac OSX 10.15 v1r10Unix

AUDIT AND ACCOUNTABILITY

Check PolicyBanner.rtf file existDISA STIG Apple Mac OSX 10.13 v2r5Unix
MacOS 10.13DISA STIG Apple Mac OSX 10.13 v2r5Unix