The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning. Learn more →
Macos_security Alternatives
Similar projects and alternatives to macos_security
-
InfluxDB
Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
-
heimdall2
Heimdall Enterprise Server 2 lets you view, store, and compare automated security control scan results.
-
WorkOS
The modern identity platform for B2B SaaS. The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning.
-
saf
The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools developed by MITRE and the security community to streamline security automation for systems and DevOps pipelines
-
scriptsandthings_Jamf_JSON_Schemas
Discontinued JSON Schemas for Jamf Pro - For configuration of application settings from within the Jamf web GUI
macos_security reviews and mentions
- Windows Security Compliance project
-
FIPS 140 and MacOS
For starters there's an entire NIST project for macOS Security Compliance - https://github.com/usnistgov/macos_security this will make your life a million times easier to meet a lot of the technical controls required for compliance. Nothing like this really exists for Windows or Linux(closest is Compliance As Code https://github.com/ComplianceAsCode/content)
-
Nist controls and acceptable artifacts and evidence. Does anyone have a controls spreadsheet that lists all 800-53 controls and evidence required to satisfy that control?
https://github.com/usnistgov/macos_security - for macOS this would help.
-
Need reporting about device CIS compliance
I’d highly recommend checking out the usnistgov/macos_security on GitHub. You can generate a benchmark and then feed the output into extension attributes to trigger policies on.
- CIS Benchmark deployment approach
-
Could use some advice on my career change
Study about cybersecurity, or how to harden a macOS fleet against published security frameworks.
-
Enrolling devices in ABM/Mosyle
Weigh the pros and cons about having your end-users be standard users or admins on their Macs. If they are already admins (probably), consider the political blowback if you take away their admin rights and flexibility and autonomy they've become used to. Conversely, consider the security posture of your organization. If it has to adhere to some well-known guides (like 800-171 o 800-53r5), then you may not be able to allow end-users to be admins. Take a look at the macOS Security Compliance Project.
-
Here's a recap of the top-voted webinar: How to Harden Macs!
NIST Compliance Benchmarks: github.com/usnistgov/macos_security
- Hardening macOS
-
Disabling Bonjour on monterey
Like OP, I'm trying to disable both bonjour and netbios. I'm using this script: https://github.com/usnistgov/macos_security/blob/main/includes/enablePF-mscp.sh
-
A note from our sponsor - WorkOS
workos.com | 24 Apr 2024
Stats
usnistgov/macos_security is an open source project licensed under GNU General Public License v3.0 or later which is an OSI approved license.
The primary programming language of macos_security is YAML.
Popular Comparisons
- macos_security VS macOS-Security-and-Privacy-Guide
- macos_security VS Installomator
- macos_security VS CIS-for-macOS-BigSur-Intel-M1
- macos_security VS CIS-macOS-Security
- macos_security VS windows_hardening
- macos_security VS heimdall2
- macos_security VS TheMacHardeningScripts
- macos_security VS CIS-for-macOS-Catalina-CP
- macos_security VS saf
- macos_security VS santa
Sponsored