CIS Apple macOS 12.0 Monterey Cloud-tailored v1.0.0 L1

Audit Details

Name: CIS Apple macOS 12.0 Monterey Cloud-tailored v1.0.0 L1

Updated: 1/6/2025

Authority: CIS

Plugin: Unix

Revision: 1.1

Estimated Item Count: 49

File Details

Filename: CIS_Apple_macOS_12.0_Monterey_Cloud-tailored_v1.0.0_L1.audit

Size: 126 kB

MD5: 5362fa45f0104395e311932a0d6f8d56
SHA256: 2b2aa49421e9ba6fe250b6983d857ae49900fb6227cfa65464a777e736ca2f7e

Audit Items

DescriptionCategories
1.1 Ensure All Apple-provided Software Is Current

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2 Ensure Auto Update Is Enabled

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.3 Ensure Download New Updates When Available Is Enabled

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.4 Ensure Installation of App Update Is Enabled

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.5 Ensure System Data Files and Security Updates Are Downloaded Automatically Is Enabled

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.6 Ensure Install of macOS Updates Is Enabled

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

2.1.1 Ensure "Set time and date automatically" Is Enabled

AUDIT AND ACCOUNTABILITY

2.1.2 Ensure Time Is Set Within Appropriate Limits

AUDIT AND ACCOUNTABILITY

2.2.1 Ensure an Inactivity Interval of 20 Minutes Or Less for the Screen Saver Is Enabled

ACCESS CONTROL

2.3.1 Ensure Remote Apple Events Is Disabled

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

2.3.2 Ensure File Sharing Is Disabled

ACCESS CONTROL, CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

2.4.1.1 Ensure Firewall Is Enabled

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT, INCIDENT RESPONSE, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

2.4.1.2 Ensure Firewall Stealth Mode Is Enabled

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION

2.4.3 Ensure Limit Ad Tracking Is Enabled

CONFIGURATION MANAGEMENT

2.4.4 Ensure Gatekeeper Is Enabled

SYSTEM AND INFORMATION INTEGRITY

2.4.5 Ensure a Custom Message for the Login Screen Is Enabled

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

2.4.6 Ensure a Password is Required to Wake the Computer From Sleep or Screen Saver Is Enabled

IDENTIFICATION AND AUTHENTICATION

3.1 Ensure Security Auditing Is Enabled

AUDIT AND ACCOUNTABILITY

3.3 Ensure install.log Is Retained for 365 or More Days and No Maximum Size

AUDIT AND ACCOUNTABILITY

3.4 Ensure Security Auditing Retention Is Enabled

AUDIT AND ACCOUNTABILITY

3.5 Ensure Access to Audit Records Is Controlled

ACCESS CONTROL, MEDIA PROTECTION

3.6 Ensure Firewall Logging Is Enabled and Configured

AUDIT AND ACCOUNTABILITY, SYSTEM AND COMMUNICATIONS PROTECTION

4.2 Ensure HTTP Server Is Disabled

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

4.3 Ensure NFS Server Is Disabled

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

5.1.1 Ensure Home Folders Are Secure

ACCESS CONTROL, MEDIA PROTECTION

5.1.2 Ensure System Integrity Protection Status (SIP) Is Enabled

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

5.1.3 Ensure Apple Mobile File Integrity (AMFI) Is Enabled

CONFIGURATION MANAGEMENT

5.1.4 Ensure Signed System Volume (SSV) Is Enabled

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.1.5 Ensure Appropriate Permissions Are Enabled for System Wide Applications

ACCESS CONTROL, MEDIA PROTECTION

5.1.6 Ensure No World Writable Files Exist in the System Folder

ACCESS CONTROL, MEDIA PROTECTION

5.2.1 Ensure Password Account Lockout Threshold Is Configured

ACCESS CONTROL

5.2.2 Ensure Password Minimum Length Is Configured

IDENTIFICATION AND AUTHENTICATION

5.2.7 Ensure Password Age Is Configured

ACCESS CONTROL

5.2.8 Ensure Password History Is Configured

IDENTIFICATION AND AUTHENTICATION

5.3 Ensure the Sudo Timeout Period Is Set to Zero

ACCESS CONTROL

5.4 Ensure a Separate Timestamp Is Enabled for Each User/tty Combo

ACCESS CONTROL

5.5 Ensure the "root" Account Is Disabled

ACCESS CONTROL

5.6 Ensure Automatic Login Is Disabled

IDENTIFICATION AND AUTHENTICATION

5.7 Ensure an Administrator Account Cannot Log In to Another User's Active and Locked Session

ACCESS CONTROL

5.9 Ensure Users' Accounts Do Not Have a Password Hint

IDENTIFICATION AND AUTHENTICATION

5.10 Ensure Secure Keyboard Entry Terminal.app Is Enabled

CONFIGURATION MANAGEMENT

5.11 Ensure XProtect Is Running and Updated

SYSTEM AND INFORMATION INTEGRITY

6.1.1 Ensure Login Window Displays as Name and Password Is Enabled

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

6.1.2 Ensure Show Password Hints Is Disabled

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

6.1.3 Ensure Guest Account Is Disabled

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, IDENTIFICATION AND AUTHENTICATION

6.1.4 Ensure Guest Access to Shared Folders Is Disabled

ACCESS CONTROL, MEDIA PROTECTION

6.1.5 Ensure the Guest Home Folder Does Not Exist

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

6.2 Ensure Show All Filename Extensions Setting is Enabled

CONFIGURATION MANAGEMENT

CIS_Apple_macOS_12.0_Monterey_Cloud-tailored_v1.0.0_L1.audit from CIS Apple macOS 12.0 Monterey Cloud-tailored Benchmark v1.0.0