U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Apple OS X 10.12 STIG Version 1, Release 6 Checklist Details (Checklist Revisions)

Supporting Resources:

Target:

Target CPE Name
Apple OS X 10.12 cpe:/o:apple:mac_os_x:10.12.0 (View CVEs)

Checklist Highlights

Checklist Name:
Apple OS X 10.12 STIG
Checklist ID:
788
Version:
Version 1, Release 6
Type:
Compliance
Review Status:
Final
Authority:
Governmental Authority: Defense Information Systems Agency
Original Publication Date:
05/25/2017

Checklist Summary:

The Apple OS X 10.12 Security Technical Implementation Guide (STIG) provides security policy and configuration requirements for the use of Apple OS X 10.12 in the Department of Defense (DoD). Guidance in these documents applies only to Apple OS X 10.12 and related components on DoD systems and excludes any other components or software running on DoD systems. Hardening the Apple OS X Server application suite is not addressed in these documents. The Apple OS X 10.12 STIG presumes operation in an environment compliant with all applicable DoD guidance, especially concerning remote access and network infrastructure.

Checklist Role:

  • Operating System

Known Issues:

Not provided.

Target Audience:

Not provided.

Target Operational Environment:

  • Managed
  • Specialized Security-Limited Functionality (SSLF)

Testing Information:

Not provided.

Regulatory Compliance:

DoD Instruction (DoDI) 8500.01 All technical NIST SP 800-53 requirements were considered while developing this STIG. Requirements that are applicable and configurable will be included in the final STIG. A report marked For Official Use Only (FOUO) will be available for those items that did not meet requirements. This report will be available to component DAA personnel for risk assessment purposes by request via email to: disa.stig_spt@mail.mil

Comments/Warnings/Miscellaneous:

Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil. DISA Field Security Operations (FSO) will coordinate all change requests with the relevant DoD organizations before inclusion in this document. Approved changes will be made in accordance with the DISA FSO maintenance release schedule

Disclaimer:

Not provided.

Product Support:

Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil. DISA Field Security Operations (FSO) will coordinate all change requests with the relevant DoD organizations before inclusion in this document. Approved changes will be made in accordance with the DISA FSO maintenance release schedule

Point of Contact:

disa.stig_spt@mail.mil

Sponsor:

Not provided.

Licensing:

Not provided.

Change History:

Updated - DRAFT to UNDER REVIEW - 08/16/2017
Updated to FINAL - 8/18/2017
Updated to Version 1, Release 2 - 02/16/2018
Updated to FINAL - 3/18/2018
updated to v1,r3 - 4/25/18
Updated to FINAL - 5/25/18
Corrected SHA discrepancy - 8/6/18
updated to Version 1, Release 4 - 1/23/19
Updated to FINAL - 2/19/19
Updated URLs - 6/4/19

Dependency/Requirements:

URL Description

References:

Reference URL Description
https://dl.dod.cyber.mil/wp-content/uploads/stigs/pdf/U_Apple_OS_X_10-12_STIG_V1_Release_Memo.pdf Apple OS X 10.12 STIG Ver 1 Release Memo

NIST checklist record last modified on 06/05/2019