macos_security
macOS Security Compliance Project (by usnistgov)
macos_security | CIS-macOS-Security | |
---|---|---|
18 | 3 | |
2,042 | 70 | |
1.7% | - | |
7.6 | 1.8 | |
15 days ago | over 3 years ago | |
YAML | ||
GNU General Public License v3.0 or later | Apache License 2.0 |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
macos_security
Posts with mentions or reviews of macos_security.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2023-04-17.
- Windows Security Compliance project
-
FIPS 140 and MacOS
For starters there's an entire NIST project for macOS Security Compliance - https://github.com/usnistgov/macos_security this will make your life a million times easier to meet a lot of the technical controls required for compliance. Nothing like this really exists for Windows or Linux(closest is Compliance As Code https://github.com/ComplianceAsCode/content)
-
Nist controls and acceptable artifacts and evidence. Does anyone have a controls spreadsheet that lists all 800-53 controls and evidence required to satisfy that control?
https://github.com/usnistgov/macos_security - for macOS this would help.
-
Need reporting about device CIS compliance
I’d highly recommend checking out the usnistgov/macos_security on GitHub. You can generate a benchmark and then feed the output into extension attributes to trigger policies on.
- CIS Benchmark deployment approach
-
Could use some advice on my career change
Study about cybersecurity, or how to harden a macOS fleet against published security frameworks.
-
Enrolling devices in ABM/Mosyle
Weigh the pros and cons about having your end-users be standard users or admins on their Macs. If they are already admins (probably), consider the political blowback if you take away their admin rights and flexibility and autonomy they've become used to. Conversely, consider the security posture of your organization. If it has to adhere to some well-known guides (like 800-171 o 800-53r5), then you may not be able to allow end-users to be admins. Take a look at the macOS Security Compliance Project.
-
Here's a recap of the top-voted webinar: How to Harden Macs!
NIST Compliance Benchmarks: github.com/usnistgov/macos_security
- Hardening macOS
-
Disabling Bonjour on monterey
Like OP, I'm trying to disable both bonjour and netbios. I'm using this script: https://github.com/usnistgov/macos_security/blob/main/includes/enablePF-mscp.sh
CIS-macOS-Security
Posts with mentions or reviews of CIS-macOS-Security.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2023-01-30.
-
Need reporting about device CIS compliance
https://support.apple.com/guide/certifications/macos-security-compliance-project-apc322685bb2/web should be your first stop and that Apple Support page has a link to the macOS Security Compliance Project.
-
Disabling Bonjour on monterey
I’ve got json schemas here that might cover that, been putting these together for the 2022 CIS benchmarks for Monterey https://github.com/scriptsandthings/scriptsandthings_Jamf_JSON_Schemas/tree/main/Schemas/Apple they’re based on the plists that https://github.com/mvdbent/CIS-macOS-Security spit out at me for CIS level 1 and level 2.
- Homebrew Package Manager Harden Script
What are some alternatives?
When comparing macos_security and CIS-macOS-Security you can also consider the following projects:
CIS-for-macOS-Catalina-CP - CIS Benchmarks for macOS Catalina
scriptsandthings_Jamf_JSON_Schemas - JSON Schemas for Jamf Pro - For configuration of application settings from within the Jamf web GUI
macOS-Security-and-Privacy-Guide - Community guide to securing and improving privacy on macOS.
TheMacHardeningScripts - Scripts to secure and harden Mac OS X
macos_security vs CIS-for-macOS-Catalina-CP
CIS-macOS-Security vs scriptsandthings_Jamf_JSON_Schemas
macos_security vs macOS-Security-and-Privacy-Guide
CIS-macOS-Security vs macOS-Security-and-Privacy-Guide
macos_security vs scriptsandthings_Jamf_JSON_Schemas
CIS-macOS-Security vs TheMacHardeningScripts