CIS Mac OSX 10.5 (Leopard) Benchmark Version v1.0.0 Checklist Details (Checklist Revisions)
NOTE
This is not the current revision of this Checklist, view the current revision.
Supporting Resources:
-
Download Prose - CIS Mac OSX 10.5 (Leopard) Benchmark v1.0.0
- Center for Internet Security (CIS)
Target:
Target | CPE Name |
---|---|
Apple Mac OS X 10.5 | cpe:/o:apple:mac_os_x:10.5 (View CVEs) |
Checklist Highlights
- Checklist Name:
- CIS Mac OSX 10.5 (Leopard) Benchmark
- Checklist ID:
- 46
- Version:
- Version v1.0.0
- Type:
- Compliance
- Review Status:
- Final
- Authority:
- Third Party: Center for Internet Security (CIS)
- Original Publication Date:
- 05/09/2008
Checklist Summary:
This CIS Benchmark document is designed to provide novice and above level users with clear guidance for securing Mac OS X Panther. The benchmark guides a user or administrator, from the point of installation (after updates), through the process of securing a Mac OS X workstation. This benchmark implements best practices and techniques through a combination of scripting and user interface security steps to achieve the strict end goal of a secure, functional end-user device (rather than a server).
Checklist Role:
- Desktop Operating System
Known Issues:
Not provided.
Target Audience:
Not provided.
Target Operational Environment:
- Managed
Testing Information:
Not provided.
Regulatory Compliance:
Not provided.
Comments/Warnings/Miscellaneous:
Not provided.
Disclaimer:
Differs for Public and Private consumers, please read disclaimer information from the CIS web site located at: http://www.cisecurity.org/sub_form.html
Product Support:
Not provided.
Point of Contact:
cis-feedback@cisecurity.org
Sponsor:
Not provided.
Licensing:
Differs for Public and Private consumers, please read licensing information from the CIS web site located at: http://www.cisecurity.org/sub_form.html
Change History:
Dependency/Requirements:
URL | Description |
---|
References:
Reference URL | Description |
---|