CIS Apple OSX 10.10 Yosemite L2 v1.2.0

Audit Details

Name: CIS Apple OSX 10.10 Yosemite L2 v1.2.0

Updated: 4/12/2023

Authority: CIS

Plugin: Unix

Revision: 1.18

Estimated Item Count: 30

File Details

Filename: CIS_OSX_10.10_v1.2.0_L2.audit

Size: 37.3 kB

MD5: b43c17bfe9fb826b6cdb24a7027ad228
SHA256: a2dfcfc5e5918b92e51d0e765f178db6a35ea2e31694871427645971f3015db1

Audit Items

DescriptionCategories
2.2.1 Enable 'Set time and date automatically'

AUDIT AND ACCOUNTABILITY

2.3.2 Secure screen saver corners - bottom left corner

ACCESS CONTROL

2.3.2 Secure screen saver corners - bottom right corner

ACCESS CONTROL

2.3.2 Secure screen saver corners - top left corner

ACCESS CONTROL

2.3.2 Secure screen saver corners - top right corner

ACCESS CONTROL

2.5.1 Disable 'Wake for network access'

ACCESS CONTROL

2.5.2 Disable sleeping the computer when connected to power

ACCESS CONTROL

2.6.6 Enable Location Services

CONFIGURATION MANAGEMENT

2.6.7 Monitor Location Services Access

CONFIGURATION MANAGEMENT

2.7.1 iCloud configuration

ACCESS CONTROL

2.7.2 iCloud keychain

ACCESS CONTROL

2.7.3 iCloud Drive

ACCESS CONTROL

2.8.1 Time Machine Auto-Backup

CONTINGENCY PLANNING

2.12 Configure Secure Empty Trash

CONFIGURATION MANAGEMENT

3.4 Enable remote logging for Desktops on trusted networks

AUDIT AND ACCOUNTABILITY

4.1 Disable Bonjour advertising service

SYSTEM AND COMMUNICATIONS PROTECTION

4.3 Create network specific locations

SYSTEM AND COMMUNICATIONS PROTECTION

5.1.5 Check Library folder for world writable files

ACCESS CONTROL

5.4 Automatically lock the login keychain for inactivity

IDENTIFICATION AND AUTHENTICATION

5.5 Ensure login keychain is locked when the computer sleeps

IDENTIFICATION AND AUTHENTICATION

5.6 Enable OCSP and CRL certificate checking - CRLStyle

IDENTIFICATION AND AUTHENTICATION

5.6 Enable OCSP and CRL certificate checking - OCSPStyle

IDENTIFICATION AND AUTHENTICATION

5.13 Create a Login window banner

ACCESS CONTROL

5.15 Disable Fast User Switching

ACCESS CONTROL

5.16 Secure individual keychain and items

IDENTIFICATION AND AUTHENTICATION

5.17 Create specialized keychains for different purposes

IDENTIFICATION AND AUTHENTICATION

5.18 Install an approved tokend for smartcard authentication

IDENTIFICATION AND AUTHENTICATION

6.4 Safari disable Internet Plugins for global use

CONFIGURATION MANAGEMENT

6.5 Use parental controls for systems that are not centrally managed

ACCESS CONTROL

Apple OSX 10.10 Yosemite Level II, version 1.2.0

CONFIGURATION MANAGEMENT