1.8 Ensure Computer Name Does Not Contain PII or Protected Organizational Information | CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT |
2.3.2 Ensure Screen Saver Corners Are Secure | ACCESS CONTROL |
2.4.10 Ensure Content Caching Is Disabled | CONFIGURATION MANAGEMENT |
2.4.12 Ensure Media Sharing Is Disabled | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
2.5.3 Ensure Location Services Is Enabled | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
2.5.4 Audit Location Services Access | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
2.5.5 Ensure Sending Diagnostic and Usage Data to Apple Is Disabled | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
2.6.1.1 Audit iCloud Keychain | ACCESS CONTROL, CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
2.6.1.2 Audit iCloud Drive | ACCESS CONTROL, CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
2.6.1.3 Ensure iCloud Drive Document and Desktop Sync Is Disabled | ACCESS CONTROL, CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
2.6.1.4 Audit Find My Mac | ACCESS CONTROL, CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
2.6.2 Audit App Store Password Settings | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
2.7.1 Ensure Backup Automatically is Enabled If Time Machine Is Enabled | CONTINGENCY PLANNING |
2.8.1.1 Ensure the OS Is Not Active When Resuming from Standby (Intel) | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
2.8.1.2 Ensure the OS Is Not Active When Resuming from Sleep and Display Sleep (Apple Silicon) | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
3.2 Ensure Security Auditing Flags For User-Attributable Events Are Configured Per Local Organizational Requirements | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
3.7 Audit Software Inventory | CONFIGURATION MANAGEMENT, MAINTENANCE |
4.1 Ensure Bonjour Advertising Services Is Disabled | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
5.1.7 Ensure No World Writable Files Exist in the Library Folder | ACCESS CONTROL, MEDIA PROTECTION |
5.2.3 Ensure Complex Password Must Contain Alphabetic Characters Is Configured | IDENTIFICATION AND AUTHENTICATION |
5.2.4 Ensure Complex Password Must Contain Numeric Character Is Configured | IDENTIFICATION AND AUTHENTICATION |
5.2.5 Ensure Complex Password Must Contain Special Character Is Configured | IDENTIFICATION AND AUTHENTICATION |
5.2.6 Ensure Complex Password Must Contain Uppercase and Lowercase Characters Is Configured | IDENTIFICATION AND AUTHENTICATION |
5.8 Ensure a Login Window Banner Exists | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
7.1.1 Ensure Protect Mail Activity in Mail Is Enabled | CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION |
7.2.2 Audit History and Remove History Items | CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION |
7.2.6 Audit Hide IP Address in Safari Setting | CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION |
7.2.9 Audit AutoFill | CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION |
CIS_Apple_macOS_12.0_Monterey_v3.1.0_L2.audit from CIS Apple macOS 12.0 Monterey Benchmark v3.1.0 | |