Apple OS X 10.13 STIG Ver 2, Rel 5 Checklist Details (Checklist Revisions)
Supporting Resources:
-
Download Standalone XCCDF 1.1.4 - Sunset - Apple macOS 10.13 STIG - Ver 2, Rel 5
- Defense Information Systems Agency
Target:
Target | CPE Name |
---|---|
Apple macOS 10.13 | cpe:/o:apple:mac_os_x:10.13.0 (View CVEs) |
Checklist Highlights
- Checklist Name:
- Apple OS X 10.13 STIG
- Checklist ID:
- 878
- Version:
- Ver 2, Rel 5
- Type:
- Compliance
- Review Status:
- Archived
- Authority:
- Governmental Authority: Defense Information Systems Agency
- Original Publication Date:
- 09/28/2018
Checklist Summary:
The Apple OS X 10.13 Security Technical Implementation Guide (STIG) provides security policy and configuration requirements for the use of Apple OS X 10.13 in the Department of Defense (DoD). Guidance in these documents applies only to Apple OS X 10.13 and related components on DoD systems and excludes any other components or software running on DoD systems. Hardening the Apple OS X 10.13 Server application suite is not addressed in these documents. The Apple OS X 10.13 STIG presumes operation in an environment compliant with all applicable DoD guidance, especially concerning remote access and network infrastructure.
Checklist Role:
- Operating System
Known Issues:
Not provided.
Target Audience:
Not provided.
Target Operational Environment:
- Managed
- Specialized Security-Limited Functionality (SSLF)
Testing Information:
Not provided.
Regulatory Compliance:
DoD Instruction (DoDI) 8500.01 All technical NIST SP 800-53 requirements were considered while developing this STIG. Requirements that are applicable and configurable will be included in the final STIG. A report marked For Official Use Only (FOUO) will be available for those items that did not meet requirements. This report will be available to component DAA personnel for risk assessment purposes by request via email to: disa.stig_spt@mail.mil
Comments/Warnings/Miscellaneous:
Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil. DISA Field Security Operations (FSO) will coordinate all change requests with the relevant DoD organizations before inclusion in this document. Approved changes will be made in accordance with the DISA FSO maintenance release schedule.
Disclaimer:
Not provided.
Product Support:
Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil. DISA Field Security Operations (FSO) will coordinate all change requests with the relevant DoD organizations before inclusion in this document. Approved changes will be made in accordance with the DISA FSO maintenance release schedule
Point of Contact:
disa.stig_spt@mail.mil
Sponsor:
Not provided.
Licensing:
Not provided.
Change History:
New Checklist - 10/26/18 Updated to FINAL - 11/26/18 updated to Ver 1, Rel 2 - 4/30/19 Updated URLs - 6/5/19 Updated URLs - 8/12/2019 updated resource title - 11/6/19 updated URLs per DISA - 1/21/2020 Updated URLs per DISA - 4/24/2020 /updated URLs - 8/3/2020 null updated URLs - 10/27/2020 updated URL per DISA - 1/26/2021 null Updated resource per DISA - 4/28/21 updated URLs - 1/26/2022 sunset per DISA - 4/25/2022
Dependency/Requirements:
URL | Description |
---|
References:
Reference URL | Description |
---|