Home
Cyber Defense 2200 Mac OS

Cyber Defense 2200 Mac OS

May 13 2021

Cyber Defense 2200 Mac OS

Checklist Summary:. This Macintosh Operating System X Version 10.6 Technology Overview (or the Mac OS X 10.6 Technology Overview as it will be referred to from here forth), along with the Mac OS X Security Technical Implementation Guide (STIG) provides the technical security policies, requirements, and implementation details for applying security concepts to the Mac OS X system. Get more done with the new Google Chrome. A more simple, secure, and faster web browser than ever, with Google’s smarts built-in. Mac OS is completely invincible. Mac users still have to be wary of malware that relies on the user falling for a cyber-trap. For example, a Mac users can be fooled into downloading malware disguised as an antivirus program. MYTH: “My phone is safer than my computer or laptop because it can’t get hacked!” Most of the cyber security.

  • Download and install the OS X Smartcard Services package The OS X Smartcard Services Package allows a Mac to read and communicate with a smart card. In order for your machine to recognize your CAC certificates and DoD websites as trusted, the installer will load the DoD CA certificates on OS X.
  • Apple's Mac OS X MAC framework is an implementation of the TrustedBSD MAC framework. A limited high-level sandboxing interface is provided by the command-line function sandboxinit. See the sandboxinit manual page for documentation. Oracle Label Security is an implementation of mandatory access control in the Oracle DBMS.

Checklist Summary:

This Macintosh Operating System X Version 10.6 Technology Overview (or the Mac OS X 10.6 Technology Overview as it will be referred to from here forth), along with the Mac OS X Security Technical Implementation Guide (STIG) provides the technical security policies, requirements, and implementation details for applying security concepts to the Mac OS X system. With this release of the MAC OS X 10.6 STIG the UNIX Security Requirement Guide (SRG) has been used to enhance the security of the underlying UNIX operating system the Mac OS X runs on. Many new vulnerabilities have been added to the STIG as a result of the UNIX SRG.

Checklist Role:

  • Operating System

Known Issues:

Not provided.

Target Audience:

This document is a requirement for all DoD-administered systems and all systems connected to DoD networks. These requirements are designed to assist Security Managers (SMs), Information Assurance Managers (IAMs), IAOs, and System Administrators (SAs) with configuring and maintaining security controls. This guidance supports DoD system design, development, implementation, certification, and accreditation efforts.

Target Operational Environment:

Cyber Defense 2200 Mac OS
  • Managed
  • Specialized Security-Limited Functionality (SSLF)

Testing Information:

Apple Mac OS X 10.6

Regulatory Compliance:

Department of Defense [DoD] 8500

Comments/Warnings/Miscellaneous:

Comments or proposed revisions to this document should be sent via e-mail to fso_spt@disa.mil. DISA Field Security Operations (FSO) will coordinate all change requests with the relevant DoD organizations before inclusion in this document.

Disclaimer:

Not provided.

Product Support:

Comments or proposed revisions to this document should be sent via e-mail to fso_spt@disa.mil. DISA Field Security Operations (FSO) will coordinate all change requests with the relevant DoD organizations before inclusion in this document.

Point of Contact:

Comments or proposed revisions to this document should be sent via e-mail to fso_spt@disa.mil. DISA Field Security Operations (FSO) will coordinate all change requests with the relevant DoD organizations before inclusion in this document.

Sponsor:

Developed by DISA for the DOD

Licensing:

Not provided.

Change History:

Dependency/Requirements:

URLDescription
https://dl.dod.cyber.mil/wp-content/uploads/stigs/pdf/u_mac_osx_10-6_stig_releasememo.pdfSunset - Apple OS X 10.6 Release Memo

References:

Reference URLDescription

NIST checklist record last modified on 09/11/2019

Checklist Summary:

The Apple OS X 10.12 Security Technical Implementation Guide (STIG) provides security policy and configuration requirements for the use of Apple OS X 10.12 in the Department of Defense (DoD). Guidance in these documents applies only to Apple OS X 10.12 and related components on DoD systems and excludes any other components or software running on DoD systems. Hardening the Apple OS X Server application suite is not addressed in these documents. The Apple OS X 10.12 STIG presumes operation in an environment compliant with all applicable DoD guidance, especially concerning remote access and network infrastructure.

Checklist Role:

  • Operating System

Known Issues:

Not provided.

Target Audience:

Not provided.

Target Operational Environment:

  • Managed
  • Specialized Security-Limited Functionality (SSLF)

Testing Information:

Not provided.

Regulatory Compliance:

DoD Instruction (DoDI) 8500.01 All technical NIST SP 800-53 requirements were considered while developing this STIG. Requirements that are applicable and configurable will be included in the final STIG. A report marked For Official Use Only (FOUO) will be available for those items that did not meet requirements. This report will be available to component DAA personnel for risk assessment purposes by request via email to: disa.stig_spt@mail.mil

Comments/Warnings/Miscellaneous:

Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil. DISA Field Security Operations (FSO) will coordinate all change requests with the relevant DoD organizations before inclusion in this document. Approved changes will be made in accordance with the DISA FSO maintenance release schedule

Disclaimer:

Not provided.

Product Support:

Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil. DISA Field Security Operations (FSO) will coordinate all change requests with the relevant DoD organizations before inclusion in this document. Approved changes will be made in accordance with the DISA FSO maintenance release schedule

Point of Contact:

disa.stig_spt@mail.mil

Sponsor:

Cyber Defense 2200 Mac Os Version

Not provided.

Licensing:

Not provided.

Change History:

Dependency/Requirements:

URLDescription

References:

Reference URLDescription

Cyber Defense 2200 Mac Os X

NIST checklist record last modified on 01/17/2020

Cyber Defense 2200 Mac OS

Leave a Reply

Cancel reply