2.3.2 Ensure Screen Saver Corners Are Secure - bottom left corner | CIS Apple macOS 10.14 v2.0.0 L2 | Unix | ACCESS CONTROL |
2.3.2 Ensure Screen Saver Corners Are Secure - bottom right corner | CIS Apple macOS 10.14 v2.0.0 L2 | Unix | ACCESS CONTROL |
2.3.2 Secure screen saver corners - bottom right corner | CIS Apple macOS 10.13 L2 v1.1.0 | Unix | ACCESS CONTROL |
2.3.2 Secure screen saver corners - top left corner | CIS Apple macOS 10.12 L2 v1.2.0 | Unix | ACCESS CONTROL |
2.3.2 Secure screen saver corners - top right corner | CIS Apple macOS 10.12 L2 v1.2.0 | Unix | ACCESS CONTROL |
2.5.3 Ensure Location Services Is Enabled | CIS Apple macOS 10.14 v2.0.0 L2 | Unix | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
2.6.6 Enable Location Services | CIS Apple macOS 10.12 L2 v1.2.0 | Unix | CONFIGURATION MANAGEMENT |
2.6.7 Monitor Location Services Access | CIS Apple macOS 10.12 L2 v1.2.0 | Unix | CONFIGURATION MANAGEMENT |
2.6.7 Monitor Location Services Access - evaluate application | CIS Apple macOS 10.12 L2 v1.2.0 | Unix | AUDIT AND ACCOUNTABILITY |
2.7.1 Time Machine Auto-Backup | CIS Apple macOS 10.13 L2 v1.1.0 | Unix | CONTINGENCY PLANNING |
2.7.3 iCloud Drive | CIS Apple macOS 10.12 L2 v1.2.0 | Unix | ACCESS CONTROL |
2.8.1 Time Machine Auto-Backup | CIS Apple macOS 10.12 L2 v1.2.0 | Unix | CONTINGENCY PLANNING |
2.12 Securely delete files as needed | CIS Apple macOS 10.12 L2 v1.2.0 | Unix | CONFIGURATION MANAGEMENT |
3.2 Configure Security Auditing Flags - 'audit successful/failed file deletion events' | CIS Apple macOS 10.12 L2 v1.2.0 | Unix | AUDIT AND ACCOUNTABILITY |
3.2 Configure Security Auditing Flags per local organizational requirements - 'audit successful/failed administrative events' | CIS Apple macOS 10.13 L2 v1.1.0 | Unix | AUDIT AND ACCOUNTABILITY |
3.2 Ensure Security Auditing Flags Are Configured Per Local Organizational Requirements - 'audit failed program execution' | CIS Apple macOS 10.14 v2.0.0 L2 | Unix | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
3.2 Ensure Security Auditing Flags Are Configured Per Local Organizational Requirements - 'audit successful/failed file attribute modification events' | CIS Apple macOS 10.14 v2.0.0 L2 | Unix | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
3.2.1 Restrict Recursive Queries | CIS ISC BIND 9.0/9.5 v2.0.0 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
3.7 Audit Software Inventory | CIS Apple macOS 10.14 v2.0.0 L2 | Unix | CONFIGURATION MANAGEMENT, MAINTENANCE |
4.1 Disable Bonjour advertising service | CIS Apple macOS 10.12 L2 v1.2.0 | Unix | CONFIGURATION MANAGEMENT |
4.3 Audit Network Specific Locations | CIS Apple macOS 10.14 v2.0.0 L2 | Unix | CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION |
5.1.7 Ensure No World Writable Files Exist in the Library Folder | CIS Apple macOS 10.14 v2.0.0 L2 | Unix | ACCESS CONTROL, MEDIA PROTECTION |
5.2.3 Complex passwords must contain an Alphabetic Character | CIS Apple macOS 10.13 L2 v1.1.0 | Unix | |
5.2.3 Ensure Complex Password Must Contain Alphabetic Characters Is Configured | CIS Apple macOS 10.14 v2.0.0 L2 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.2.4 Complex passwords must contain a Numeric Character | CIS Apple macOS 10.12 L2 v1.2.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.2.4 Ensure Complex Password Must Contain Numeric Character Is Configured | CIS Apple macOS 10.14 v2.0.0 L2 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.2.5 Complex passwords must contain a Special Character | CIS Apple macOS 10.13 L2 v1.1.0 | Unix | |
5.5 Automatically lock the login keychain for inactivity | CIS Apple macOS 10.12 L2 v1.2.0 | Unix | ACCESS CONTROL |
5.6 Ensure login keychain is locked when the computer sleeps | CIS Apple macOS 10.12 L2 v1.2.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.6 Ensure login keychain is locked when the computer sleeps | CIS Apple macOS 10.13 L2 v1.1.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.7 Enable OCSP and CRL certificate checking - OCSPStyle | CIS Apple macOS 10.12 L2 v1.2.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.9 Ensure system is set to hibernate - hibernatemode | CIS Apple macOS 10.14 v2.0.0 L2 | Unix | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
5.10 Ensure system is set to hibernate | CIS Apple macOS 10.13 L2 v1.1.0 | Unix | CONFIGURATION MANAGEMENT |
5.11 Ensure system is set to hibernate | CIS Apple macOS 10.12 L2 v1.2.0 | Unix | CONFIGURATION MANAGEMENT |
5.13 Create a Login window banner | CIS Apple macOS 10.14 v2.0.0 L2 | Unix | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
5.15 Ensure Fast User Switching Is Disabled | CIS Apple macOS 10.14 v2.0.0 L2 | Unix | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
5.17 Disable Fast User Switching | CIS Apple macOS 10.12 L2 v1.2.0 | Unix | ACCESS CONTROL |
5.17 Secure individual keychains and items | CIS Apple macOS 10.13 L2 v1.1.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.19 Create specialized keychains for different purposes | CIS Apple macOS 10.12 L2 v1.2.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
6.4 Safari disable Internet Plugins for global use | CIS Apple macOS 10.12 L2 v1.2.0 | Unix | CONFIGURATION MANAGEMENT |
6.4 Use parental controls for systems that are not centrally managed | CIS Apple macOS 10.13 L2 v1.1.0 | Unix | ACCESS CONTROL |
7.1 Extensible Firmware Interface (EFI) password | CIS Apple macOS 10.14 v2.0.0 L2 | Unix | CONFIGURATION MANAGEMENT |
7.2 iSight Camera Privacy and Confidentiality Concerns | CIS Apple macOS 10.12 L2 v1.2.0 | Unix | CONFIGURATION MANAGEMENT |
7.3 Computer Name Considerations | CIS Apple macOS 10.13 L2 v1.1.0 | Unix | CONFIGURATION MANAGEMENT |
7.5 Firewall Consideration | CIS Apple macOS 10.13 L2 v1.1.0 | Unix | CONFIGURATION MANAGEMENT |
7.5 Firewall Consideration | CIS Apple macOS 10.12 L2 v1.2.0 | Unix | CONFIGURATION MANAGEMENT |
7.14 System information backup to remote computers | CIS Apple macOS 10.13 L2 v1.1.0 | Unix | CONTINGENCY PLANNING |
7.15 System information backup to remote computers | CIS Apple macOS 10.12 L2 v1.2.0 | Unix | CONTINGENCY PLANNING |
Big Sur - Configure Apple System Log Files Owned by Root and Group to Wheel | NIST macOS Big Sur v1.4.0 - All Profiles | Unix | SYSTEM AND INFORMATION INTEGRITY |
Monterey - Configure Apple System Log Files Owned by Root and Group to Wheel | NIST macOS Monterey v1.0.0 - All Profiles | Unix | SYSTEM AND INFORMATION INTEGRITY |