-
Notifications
You must be signed in to change notification settings - Fork 450
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
All edited YAML files were ran through a YAML syntax check before before committed. **macOS-13** - UPDATED: "3.5 - Ensure Access to Audit Records Is Controlled" Description and Resolution. Query did not change. - ADDED: "5.10 - Ensure XProtect Is Running and Updated" Checking for updated is actually handled via a different query. **macOS-14** - UPDATED: "3.5 - Ensure Access to Audit Records Is Controlled" Description and Resolution. Query did not change. - ADDED: "5.10 - Ensure XProtect Is Running and Updated" Checking for updated is actually handled via a different query. **macOS-15** Initial version duplicated from macOS-14 queries, then the following changes were applied: - REMOVED: "3.6 - Ensure Firewall Logging Is Enabled and Configured" The following controls were not added, further research on how to check them with osquery is required: - 2.6.3.1 - 2.6.3.5 and 2.7.2: I am not sure how we can accomplish this. - "5.11 - Ensure Logging Is Enabled For Sudo" I believe this one can be accomplished through the file_lines table --------- Co-authored-by: Sharon Katz <121527325+sharon-fdm@users.noreply.github.com> Co-authored-by: Sharon Katz <sharon@fleetdm.com>
- Loading branch information
1 parent
afebfde
commit 4f2daf2
Showing
7 changed files
with
3,578 additions
and
12 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1 @@ | ||
* Updated macos 13, 14 per latest CIS documents. Added macos 15 support. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,43 @@ | ||
# macOS 15 Sequoia benchmark | ||
|
||
Fleet's policies have been written against v1.0.0 of the benchmark. You can refer to the [CIS website](https://www.cisecurity.org/cis-benchmarks) for full details about this version. | ||
|
||
For requirements and usage details, see the [CIS Benchmarks](https://fleetdm.com/docs/using-fleet/cis-benchmarks) documentation. | ||
|
||
### Limitations | ||
|
||
The following CIS benchmarks cannot be checked with a policy in Fleet: | ||
1. 2.1.2 Audit App Store Password Settings | ||
2. 2.3.3.12 Ensure Computer Name Does Not Contain PII or Protected Organizational Information | ||
3. 2.6.6 Audit Lockdown Mode | ||
4. 2.11.2 Audit Touch ID and Wallet & Apple Pay Settings | ||
5. 2.13.1 Audit Passwords System Preference Setting | ||
6. 2.14.1 Audit Notification & Focus Settings | ||
7. 3.7 Audit Software Inventory | ||
8. 6.2.1 Ensure Protect Mail Activity in Mail Is Enabled | ||
|
||
Missing items: | ||
1. 2.6.3.1 Ensure Share Mac Analytics Is Disabled | ||
2. 2.6.3.3 Ensure Improve Assistive Voice Features Is Disabled | ||
3. 2.6.3.4 Ensure 'Share with app developers' Is Disabled | ||
4. 5.11 Ensure Logging Is Enabled for Sudo | ||
|
||
### Checks that require decision | ||
|
||
CIS has left the parameters of the following checks up to the benchmark implementer. CIS recommends that an organization make a conscious decision for these benchmarks, but does not make a specific recommendation. | ||
|
||
Fleet has provided both an "enabled" and "disabled" version of these benchmarks. When both policies are added, at least one will fail. Once your organization has made a decision, you can delete one or the other policy query. | ||
The policy will be appended with a `-enabled` or `-disabled` label, such as `2.1.1.1-enabled`. | ||
|
||
- 2.1.1.1 Audit iCloud Keychain | ||
- 2.1.1.2 Audit iCloud Drive | ||
- 2.5.1 Audit Siri | ||
- 2.8.1 Audit Universal Control | ||
|
||
Furthermore, CIS has decided to not require the following password complexity settings: | ||
- 5.2.3 Ensure Complex Password Must Contain Alphabetic Characters Is Configured | ||
- 5.2.4 Ensure Complex Password Must Contain Numeric Character Is Configured | ||
- 5.2.5 Ensure Complex Password Must Contain Special Character Is Configured | ||
- 5.2.6 Ensure Complex Password Must Contain Uppercase and Lowercase Characters Is Configured | ||
|
||
However, Fleet has provided these as policies. If your organization declines to implement these, simply delete the corresponding policies. |
Oops, something went wrong.