2.2.1 Enable 'Set time and date automatically' | AUDIT AND ACCOUNTABILITY |
2.3.2 Secure screen saver corners - bottom left corner | ACCESS CONTROL |
2.3.2 Secure screen saver corners - bottom right corner | ACCESS CONTROL |
2.3.2 Secure screen saver corners - top left corner | ACCESS CONTROL |
2.3.2 Secure screen saver corners - top right corner | ACCESS CONTROL |
2.5.1 Disable 'Wake for network access' | ACCESS CONTROL |
2.5.2 Disable sleeping the computer when connected to power | ACCESS CONTROL |
2.6.6 Enable Location Services | CONFIGURATION MANAGEMENT |
2.6.7 Monitor Location Services Access | |
2.7.1 iCloud configuration | |
2.7.2 iCloud keychain | |
2.7.3 iCloud Drive | |
2.8.1 Time Machine Auto-Backup | CONTINGENCY PLANNING |
2.12 Configure Secure Empty Trash | CONFIGURATION MANAGEMENT |
3.4 Enable remote logging for Desktops on trusted networks | AUDIT AND ACCOUNTABILITY |
4.1 Disable Bonjour advertising service | SYSTEM AND COMMUNICATIONS PROTECTION |
4.3 Create network specific locations | |
5.1.5 Check Library folder for world writable files | ACCESS CONTROL |
5.4 Automatically lock the login keychain for inactivity | IDENTIFICATION AND AUTHENTICATION |
5.5 Ensure login keychain is locked when the computer sleeps | IDENTIFICATION AND AUTHENTICATION |
5.6 Enable OCSP and CRL certificate checking - CRLStyle | IDENTIFICATION AND AUTHENTICATION |
5.6 Enable OCSP and CRL certificate checking - OCSPStyle | IDENTIFICATION AND AUTHENTICATION |
5.13 Create a Login window banner | ACCESS CONTROL |
5.15 Disable Fast User Switching | ACCESS CONTROL |
5.16 Secure individual keychain and items | |
5.17 Create specialized keychains for different purposes | |
5.18 Install an approved tokend for smartcard authentication | |
6.4 Safari disable Internet Plugins for global use | CONFIGURATION MANAGEMENT |
6.5 Use parental controls for systems that are not centrally managed | |
Apple OSX 10.10 Yosemite Level II, version 1.2.0 | |