Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/jamf/cis-for-macos-sierra
https://github.com/jamf/cis-for-macos-sierra
cis jamf mac macos macos-sierra security
Last synced: 13 days ago
JSON representation
- Host: GitHub
- URL: https://github.com/jamf/cis-for-macos-sierra
- Owner: jamf
- Created: 2017-05-18T05:37:39.000Z (over 7 years ago)
- Default Branch: master
- Last Pushed: 2018-09-10T19:39:48.000Z (about 6 years ago)
- Last Synced: 2024-10-25T05:47:33.990Z (21 days ago)
- Topics: cis, jamf, mac, macos, macos-sierra, security
- Language: Shell
- Size: 73.2 KB
- Stars: 105
- Watchers: 42
- Forks: 17
- Open Issues: 2
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
INFO:
Refers to document CIS_Apple_OSX_10.12_Benchmark_v1.0.0.pdf, available at https://benchmarks.cisecurity.org
USAGE:
# 1_Set_Organization_Priorities
Policy: Generally "Once per computer" unless organizational values change.
Admins set organizational compliance for each listed item, which gets written to plist. The values default to "true," meaning if an organization wishes to disregard a given item they must set the value to false by changing the associated comment:
OrgScore1_1="true" or OrgScore1_1="false"
The script writes to /Library/Application Support/SecurityScoring/org_security_score.plist by default.
NOTES:
Item "1.1 Verify all Apple provided software is current" is disabled by default.
Item "5.6 Enable OCSP and CRL certificate checking" is disabled by default.# 2_Security_Audit_Compliance
Policy: Some recurring trigger to track compliance over time.
Reads the plist at /Library/Application Support/SecurityScoring/org_security_score.plist. For items prioritized (listed as "true,") the script queries against the current computer/user environment to determine compliance against each item.
Non-compliant items are recorded at /Library/Application Support/SecurityScoring/org_audit
# 2.5_Audit_List Extension Attribute
Set as Data Type "String."
Reads contents of /Library/Application Support/SecurityScoring/org_audit file and records to Jamf Pro inventory record.
# 2.6_Audit_Count Extension Attribute
Set as Data Type "Integer."
Reads contents of /Library/Application Support/SecurityScoring/org_audit file and records count of items to Jamf Pro inventory record. Usable with smart group logic (2.6_Audit_Count greater than 0) to immediately determine computers not in compliance.
# 3_Security_Remediation
Policy: Some recurring trigger to enforce compliance over time.
Reads the plist at /Library/Application Support/SecurityScoring/org_security_score.plist. For items prioritized (listed as "true,") the script applies recommended remediation actions for the client/user.
SCORED CIS EXCEPTIONS:
- Does not implement pwpolicy commands (5.2.1 - 5.2.8)
- Audits but does not actively remediate (due to alternate profile/policy functionality within Jamf Pro):
* 2.4.4 Disable Printer Sharing
* 2.6.1 Enable FileVault
* 2.7.4 iCloud Drive Document sync
* 2.7.5 iCloud Drive Desktop sync
* 2.11 Java 6 is not the default Java runtime
* 5.12 Create a custom message for the Login Screen
* 5.13 Create a Login window banner