Cyber Defense 2200 Mac OS

Checklist Summary:

This Macintosh Operating System X Version 10.6 Technology Overview (or the Mac OS X 10.6 Technology Overview as it will be referred to from here forth), along with the Mac OS X Security Technical Implementation Guide (STIG) provides the technical security policies, requirements, and implementation details for applying security concepts to the Mac OS X system. With this release of the MAC OS X 10.6 STIG the UNIX Security Requirement Guide (SRG) has been used to enhance the security of the underlying UNIX operating system the Mac OS X runs on. Many new vulnerabilities have been added to the STIG as a result of the UNIX SRG.

Checklist Role:

Apple's Mac OS X MAC framework is an implementation of the TrustedBSD MAC framework. A limited high-level sandboxing interface is provided by the command-line function sandboxinit. See the sandboxinit manual page for documentation. Oracle Label Security is an implementation of mandatory access control in the Oracle DBMS. This two-year cybersecurity associate degree will prepare you to make a seamless transition into high-paying, in-demand cyber defense jobs such as a cyber defense analyst. Davenport’s nationally recognized College of Technology will provide you with career-centered cyber defense training that fully aligns with industry credentials. Running CyberAIO on Bootcamp is easy, but keep in mind that you MUST boot into Bootcamp on startup, which means you cannot use Mac OS at the same time you run Bootcamp. Bootcamp is highly not recommended if you have a low-end Mac or your storage is 128GB or less. Step 1: Get a Windows ISO image.

  • Operating System

Ismael Valenzuela is coauthor of the Cyber Defense and Blue Team Operations course, SANS SEC530: Defensible Security Architecture and Engineering. Ismael is a Senior Principal Engineer at McAfee, where he leads research on threat hunting using machine-learning and expert-system driven investigations. The Symantec Endpoint Security (SES) client for Mac is cloud-based and managed by the Integrated Cyber Defense Manager (ICDM) web page. The SES Mac client is only supported on macOS 10.15.x and 11.x with the SES Mac agent build 14.3 RU1 and newer. Additional notes. Big Sur is supported by SEP 14.3 RU1 and 14.3 RU1-MP1 only when running on Intel.

Known Issues:

Not provided.

Target Audience:

This document is a requirement for all DoD-administered systems and all systems connected to DoD networks. These requirements are designed to assist Security Managers (SMs), Information Assurance Managers (IAMs), IAOs, and System Administrators (SAs) with configuring and maintaining security controls. This guidance supports DoD system design, development, implementation, certification, and accreditation efforts.

Target Operational Environment:

  • Managed
  • Specialized Security-Limited Functionality (SSLF)

Testing Information:

Apple Mac OS X 10.6

Regulatory Compliance:

Department of Defense [DoD] 8500

Comments/Warnings/Miscellaneous:

Defense

Comments or proposed revisions to this document should be sent via e-mail to fso_spt@disa.mil. DISA Field Security Operations (FSO) will coordinate all change requests with the relevant DoD organizations before inclusion in this document.

Disclaimer:

Not provided.

Product Support:

Comments or proposed revisions to this document should be sent via e-mail to fso_spt@disa.mil. DISA Field Security Operations (FSO) will coordinate all change requests with the relevant DoD organizations before inclusion in this document.

Point of Contact:

Comments or proposed revisions to this document should be sent via e-mail to fso_spt@disa.mil. DISA Field Security Operations (FSO) will coordinate all change requests with the relevant DoD organizations before inclusion in this document.

Cyber Defense 2200 Mac Os X

Sponsor:

Developed by DISA for the DOD

Licensing:

Not provided.

Change History:

Dependency/Requirements:

URLDescription
https://dl.dod.cyber.mil/wp-content/uploads/stigs/pdf/u_mac_osx_10-6_stig_releasememo.pdfSunset - Apple OS X 10.6 Release Memo

References:

Reference URLDescription

NIST checklist record last modified on 09/11/2019

We design Mac hardware and software with advanced technologies that work together to run apps more securely, protect your data, and help keep you safe on the web. And with macOS Big Sur available as a free upgrade, it’s easy to get the most secure version of macOS for your Mac.*

Apple M1 chip.
A shared architecture for security.

The Apple M1 chip with built-in Secure Enclave brings the same powerful security capabilities of iPhone to Mac — protecting your login password, automatically encrypting your data, and powering file-level encryption so you stay safe. And the Apple M1 chip keeps macOS secure while it’s running, just as iOS has protected iPhone for years.

Apple helps you keep your Mac secure with software updates.

The best way to keep your Mac secure is to run the latest software. When new updates are available, macOS sends you a notification — or you can opt in to have updates installed automatically when your Mac is not in use. macOS checks for new updates every day and starts applying them in the background, so it’s easier and faster than ever to always have the latest and safest version.

Protection starts at the core.

The technically sophisticated runtime protections in macOS work at the very core of your Mac to keep your system safe from malware. This starts with state-of-the-art antivirus software built in to block and remove malware. Technologies like XD (execute disable), ASLR (address space layout randomization), and SIP (system integrity protection) make it difficult for malware to do harm, and they ensure that processes with root permission cannot change critical system files.

Download apps safely from the Mac App Store. And the internet.

Cyber Defense 2200 Mac Os Catalina

Now apps from both the App Store and the internet can be installed worry-free. App Review makes sure each app in the App Store is reviewed before it’s accepted. Gatekeeper on your Mac ensures that all apps from the internet have already been checked by Apple for known malicious code — before you run them the first time. If there’s ever a problem with an app, Apple can quickly stop new installations and even block the app from launching again.

Cyber defense 2200 mac os sierra

Stay in control of what data apps can access.

Cyber Defense 2200 Mac Os Operating System

Apps need your permission to access files in your Documents, Downloads, and Desktop folders as well as in iCloud Drive and external volumes. And you’ll be prompted before any app can access the camera or mic, capture keyboard activity, or take a photo or video of your screen.

FileVault 2 encrypts your data.

With FileVault 2, your data is safe and secure — even if your Mac falls into the wrong hands. FileVault 2 encrypts the entire drive on your Mac, protecting your data with XTS-AES 128 encryption. Mac computers built on the Apple M1 chip take data protection even further by using dedicated hardware to protect your login password and enabling file-level encryption, which developers can take advantage of — just as on iPhone.

Designed to protect your privacy.

Online privacy isn’t just something you should hope for — it’s something you should expect. That’s why Safari comes with powerful privacy protection technology built in, including Intelligent Tracking Prevention that identifies trackers and helps prevent them from profiling or following you across the web. A new weekly Privacy Report on your start page shows how Safari protects you as you browse over time. Or click the Privacy Report button in your Safari toolbar for an instant snapshot of the cross-site trackers Safari is actively preventing on that web page.

Automatic protections from intruders.

Safari uses iCloud Keychain to securely store your passwords across all your devices. If it ever detects a security concern, Password Monitoring will alert you. Safari also prevents suspicious websites from loading and warns you if they’re detected. And because it runs web pages in separate processes, any harmful code is confined to a single browser tab and can’t crash the whole browser or access your data.

Find your missing Mac with Find My.

The Find My app can help you locate a missing Mac — even if it’s offline or sleeping — by sending out Bluetooth signals that can be detected by nearby Apple devices. These devices then relay the detected location of your Mac to iCloud so you can locate it. It’s all anonymous and encrypted end-to-end so no one — including Apple — knows the identity of any reporting device or the location of your Mac. And it all happens silently using tiny bits of data that piggyback on existing network traffic. So there’s no need to worry about your battery life, your data usage, or your privacy being compromised.

Keep your Mac safe.
Even if it’s in the wrong hands.

All Mac systems built on the Apple M1 chip or with the Apple T2 Security Chip support Activation Lock, just like your iPhone or iPad. So if your Mac is ever misplaced or lost, the only person who can erase and reactivate it is you.

macOS Security