Item Search

NameAudit NamePluginCategory
1.2.9 - MobileIron - Turn On Do Not TrackMobileIron - CIS Apple iOS 8 v1.0.0 L2MDM

ACCESS CONTROL

1.3 Enable app update installsCIS Apple macOS 10.12 L1 v1.2.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.4 Enable system data files and security update installs - 'CriticalUpdateInstall'CIS Apple macOS 10.12 L1 v1.2.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.5 Enable macOS update installsCIS Apple macOS 10.12 L1 v1.2.0Unix

SYSTEM AND INFORMATION INTEGRITY

2.1.2 Turn off Bluetooth 'Discoverable' mode when not pairing devicesCIS Apple macOS 10.12 L1 v1.2.0Unix

CONFIGURATION MANAGEMENT

2.2.2 Ensure time set is within appropriate limitsCIS Apple macOS 10.12 L1 v1.2.0Unix

CONFIGURATION MANAGEMENT

2.3.2 Secure screen saver corners - bottom right cornerCIS Apple macOS 10.12 L2 v1.2.0Unix

ACCESS CONTROL

2.3.2 Secure screen saver corners - top right cornerCIS Apple macOS 10.12 L2 v1.2.0Unix

ACCESS CONTROL

2.3.3 Set a screen corner to Start Screen SaverCIS Apple macOS 10.12 L1 v1.2.0Unix

ACCESS CONTROL

2.4.6 Disable DVD or CD SharingCIS Apple macOS 10.12 L1 v1.2.0Unix

CONFIGURATION MANAGEMENT

2.6.1.1 Enable FileVaultCIS Apple macOS 10.12 L1 v1.2.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

2.6.6 Enable Location ServicesCIS Apple macOS 10.12 L2 v1.2.0Unix

CONFIGURATION MANAGEMENT

2.6.7 Monitor Location Services AccessCIS Apple macOS 10.12 L2 v1.2.0Unix

CONFIGURATION MANAGEMENT

2.7.3 iCloud DriveCIS Apple macOS 10.12 L2 v1.2.0Unix

ACCESS CONTROL

2.8.1 Time Machine Auto-BackupCIS Apple macOS 10.12 L2 v1.2.0Unix

CONTINGENCY PLANNING

2.12 Securely delete files as neededCIS Apple macOS 10.12 L2 v1.2.0Unix

CONFIGURATION MANAGEMENT

2.18.1 Ensure On-Device Dictation Is EnabledCIS Apple macOS 15.0 Sequoia v1.0.0 L1Unix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

3.2 Configure Security Auditing Flags - 'audit all failed events across all audit classes'CIS Apple macOS 10.12 L2 v1.2.0Unix

AUDIT AND ACCOUNTABILITY

3.2 Configure Security Auditing Flags - 'audit successful/failed administrative events'CIS Apple macOS 10.12 L2 v1.2.0Unix

AUDIT AND ACCOUNTABILITY

3.2 Configure Security Auditing Flags - 'audit successful/failed file deletion events'CIS Apple macOS 10.12 L2 v1.2.0Unix

AUDIT AND ACCOUNTABILITY

4.1 Disable Bonjour advertising serviceCIS Apple macOS 10.12 L2 v1.2.0Unix

CONFIGURATION MANAGEMENT

5.1.4 Check Library folder for world writable filesCIS Apple macOS 10.12 L2 v1.2.0Unix

ACCESS CONTROL

5.2.1 Configure account lockout thresholdCIS Apple macOS 10.12 L1 v1.2.0Unix

ACCESS CONTROL

5.2.2 Set a minimum password lengthCIS Apple macOS 10.12 L1 v1.2.0Unix

IDENTIFICATION AND AUTHENTICATION

5.2.4 Complex passwords must contain a Numeric CharacterCIS Apple macOS 10.12 L2 v1.2.0Unix

IDENTIFICATION AND AUTHENTICATION

5.2.8 Password HistoryCIS Apple macOS 10.12 L1 v1.2.0Unix

IDENTIFICATION AND AUTHENTICATION

5.3 Reduce the sudo timeout periodCIS Apple macOS 10.12 L1 v1.2.0Unix

ACCESS CONTROL

5.5 Automatically lock the login keychain for inactivityCIS Apple macOS 10.12 L2 v1.2.0Unix

ACCESS CONTROL

5.6 Ensure login keychain is locked when the computer sleepsCIS Apple macOS 10.12 L2 v1.2.0Unix

IDENTIFICATION AND AUTHENTICATION

5.11 Ensure system is set to hibernateCIS Apple macOS 10.12 L2 v1.2.0Unix

CONFIGURATION MANAGEMENT

5.14 Create a custom message for the Login ScreenCIS Apple macOS 10.12 L1 v1.2.0Unix

ACCESS CONTROL

5.15 Create a Login window bannerCIS Apple macOS 10.12 L2 v1.2.0Unix

ACCESS CONTROL

5.19 Create specialized keychains for different purposesCIS Apple macOS 10.12 L2 v1.2.0Unix

IDENTIFICATION AND AUTHENTICATION

6.1.4 Disable 'Allow guests to connect to shared folders' - AFP SharingCIS Apple macOS 10.12 L1 v1.2.0Unix

ACCESS CONTROL

6.2 Turn on filename extensionsCIS Apple macOS 10.12 L1 v1.2.0Unix

CONFIGURATION MANAGEMENT

7.12 Siri on macOSCIS Apple macOS 10.12 L1 v1.2.0Unix

CONFIGURATION MANAGEMENT

7.15 System information backup to remote computersCIS Apple macOS 10.12 L2 v1.2.0Unix

CONTINGENCY PLANNING

7.17 AirDrop security considerationsCIS Apple macOS 10.12 L1 v1.2.0Unix

CONFIGURATION MANAGEMENT

Big Sur - Apply Gatekeeper Settings to Block Applications from Unidentified DevelopersNIST macOS Big Sur v1.4.0 - All ProfilesUnix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

Big Sur - Apply Gatekeeper Settings to Block Applications from Unidentified DevelopersNIST macOS Big Sur v1.4.0 - CNSSI 1253Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

Big Sur - Ensure the System Implements Malicious Code Protection MechanismsNIST macOS Big Sur v1.4.0 - 800-53r5 HighUnix

SYSTEM AND INFORMATION INTEGRITY

Big Sur - Ensure the System Implements Malicious Code Protection MechanismsNIST macOS Big Sur v1.4.0 - 800-53r5 LowUnix

SYSTEM AND INFORMATION INTEGRITY

Big Sur - Ensure the System Implements Malicious Code Protection MechanismsNIST macOS Big Sur v1.4.0 - 800-53r5 ModerateUnix

SYSTEM AND INFORMATION INTEGRITY

Catalina - Ensure the System Implements Malicious Code Protection MechanismsNIST macOS Catalina v1.5.0 - 800-53r5 LowUnix

SYSTEM AND INFORMATION INTEGRITY

Catalina - Ensure the System Implements Malicious Code Protection MechanismsNIST macOS Catalina v1.5.0 - 800-53r5 HighUnix

SYSTEM AND INFORMATION INTEGRITY

Monterey - Apply Gatekeeper Settings to Block Applications from Unidentified DevelopersNIST macOS Monterey v1.0.0 - 800-171Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

Monterey - Ensure the System Implements Malicious Code Protection MechanismsNIST macOS Monterey v1.0.0 - 800-53r5 ModerateUnix

SYSTEM AND INFORMATION INTEGRITY

Monterey - Ensure the System Implements Malicious Code Protection MechanismsNIST macOS Monterey v1.0.0 - 800-53r5 HighUnix

SYSTEM AND INFORMATION INTEGRITY

Monterey - Ensure the System Implements Malicious Code Protection MechanismsNIST macOS Monterey v1.0.0 - 800-53r5 LowUnix

SYSTEM AND INFORMATION INTEGRITY

Monterey - Ensure the System Implements Malicious Code Protection MechanismsNIST macOS Monterey v1.0.0 - All ProfilesUnix

SYSTEM AND INFORMATION INTEGRITY