Apple macOS 15 (Sequoia) STIG Ver 1, Rel 2 Checklist Details (Checklist Revisions)
Supporting Resources:
-
Download Standalone XCCDF 1.1.4 - Apple macOS 15 (Sequoia) STIG - Ver 1, Rel 2
- Defense Information Systems Agency
Target:
Target | CPE Name |
---|---|
Apple MacOS 15.0 | cpe:/o:apple:macos:15.0 (View CVEs) |
Checklist Highlights
- Checklist Name:
- Apple macOS 15 (Sequoia) STIG
- Checklist ID:
- 1257
- Version:
- Ver 1, Rel 2
- Type:
- Compliance
- Review Status:
- Candidate
- Authority:
- Governmental Authority: Defense Information Systems Agency
- Original Publication Date:
- 12/04/2024
Checklist Summary:
The Apple macOS 15 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DOD) information systems. The Apple macOS 15 STIG includes supplemental guidance for reference when attempting to implement the Smart Card Policy requirements listed in the STIG. Failure to reference this guidance could result in a total loss of access to the operating system. The Apple macOS 15 STIG presumes operation in an environment compliant with all applicable DOD guidance, especially concerning remote access and network infrastructure. This document is meant for use in conjunction with other STIGs, such as the appropriate networking and application STIGs.
Checklist Role:
- Operating System
Known Issues:
Not provided.
Target Audience:
Not provided.
Target Operational Environment:
- Managed
- Specialized Security-Limited Functionality (SSLF)
- Standalone
Testing Information:
Not provided.
Regulatory Compliance:
Department of Defense Instruction (DODI) 8500.01
Comments/Warnings/Miscellaneous:
Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil. DISA will coordinate all change requests with the relevant DOD organizations before inclusion in this document. Approved changes will be made in accordance with the DISA maintenance release schedule.
Disclaimer:
The existence of a STIG does not equate to DOD approval for the procurement or use of a product. STIGs provide configurable operational security guidance for products being used by the DOD. STIGs, along with vendor confidential documentation, also provide a basis for assessing compliance with cybersecurity controls/control enhancements, which supports system assessment and authorization (A&A) under the DOD Risk Management Framework (RMF). Department of Defense AOs may request available vendor confidential documentation for a product that has a STIG for product evaluation and RMF purposes from disa.stig_spt@mail.mil. This documentation is not published for general access to protect the vendor’s proprietary information.
Product Support:
Parties within the DOD and federal government’s computing environments can obtain the applicable STIG from the DOD Cyber Exchange website at https://cyber.mil/. This site contains the latest copies of STIGs, SRGs, and other related security information. Those without a Common Access Card (CAC) that has DOD Certificates can obtain the STIG from https://public.cyber.mil/.
Point of Contact:
disa.stig_spt@mail.mil
Sponsor:
Not provided.
Licensing:
Not provided.
Change History:
Initial Submission as Candidate - 12/09/24 Set Status to Candidate - 12/19/2024 Updated Resource & Checklist Version - 01/30/2025
Dependency/Requirements:
URL | Description |
---|
References:
Reference URL | Description |
---|
NIST checklist record last modified on 01/30/2025
* This checklist is still undergoing review for inclusion into the NCP.