National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CIS Mac OSX 10.5 (Leopard) Benchmark v1.1.0 Checklist Details (Checklist Revisions)

Supporting Resources:

Target:

Target CPE Name Product Category
Apple Mac OS X 10.5 cpe:/o:apple:mac_os_x:10.5 (View CVEs)
  • Operating System

Checklist Highlights

Checklist Name:
CIS Mac OSX 10.5 (Leopard) Benchmark
Checklist ID:
202
Version:
v1.1.0
Type:
Compliance
Review Status:
Final
Authority:
Third Party: Center for Internet Security (CIS)
Original Publication Date:
12/29/2010
Checklist Group:
View

Checklist Summary:

Mac OS X 10.5 Leopard1 is a UNIX2 operating system sold by Apple, Inc. that only runs on Apple Macintosh hardware. Leopard comes with equipped with a number of applications and features. This document provides prescriptive guidance for securing the Leopard operating system, along with its applications and features, in accordance with best practice. However, several optional applications and features offered by Leopard, including iCal, iChat, iTunes, Mail, the Oxford dictionaries, Safari, X11, and printer drivers, will not be discussed.

Checklist Role:

  • Desktop Operating System

Known Issues:

Not provided.

Target Audience:

This benchmark provides recommendations on security for users of Mac OS X 10.5 Leopard. The recommendations are aimed at general-purpose Mac OS X systems used by individuals and by enterprise users. This document does not apply to users of Mac OS X Server or special purpose configurations.

Target Operational Environment:

  • Managed

Testing Information:

Not provided.

Regulatory Compliance:

Not provided.

Comments/Warnings/Miscellaneous:

It is assumed that the reader is versed in performing administrative configuration changes to the Leopard operating system. Additionally, recommendations articulated within this document are intended to align with the Tiger Apple/NSA Guidelines with respect to content and detail, where applicable.

Disclaimer:

CIS makes no representations, warranties, or covenants whatsoever as to (i) the positive or negative effect of the Products or the Recommendations on the operation or the security of any particular network, computer system, network device, software, hardware, or any component of any of the foregoing or (ii) the accuracy, reliability, timeliness, or completeness of the Products or the Recommendations. CIS is providing the Products and the Recommendations as is and as available without representations, warranties, or covenants of any kind.

Product Support:

Not provided.

Point of Contact:

cis-feedback@cisecurity.org

Sponsor:

Not provided.

Licensing:

Not provided.

Change History:

05-09-2008-Public Release
12-29-2010-Version 1.1.0

Dependency/Requirements:

URL Description

References:

Reference URL Description

NIST checklist record last modified on 05/10/2011