STIGhub
STIGs
RMF Controls
Compare
← CM-7 — Least Functionality
CCI-000381
Definition
Configure the system to provide only organization-defined mission essential capabilities.
Parent Control
CM-7
Least Functionality
Configuration Management
Linked STIG Checks (200)
V-237035
CAT II
The A10 Networks ADC must not have unnecessary scripts installed.
A10 Networks ADC ALG Security Technical Implementation Guide
V-237036
CAT II
The A10 Networks ADC must use DNS Proxy mode when Global Server Load Balancing is used.
A10 Networks ADC ALG Security Technical Implementation Guide
V-204656
CAT II
AAA Services must be configured to disable non-essential modules.
AAA Services Security Requirements Guide
V-213119
CAT II
Adobe Acrobat Pro DC Continuous PDF file attachments must be blocked.
Adobe Acrobat Professional DC Continuous Track Security Technical Implementation Guide
V-213120
CAT III
Adobe Acrobat Pro DC Continuous access to unknown websites must be restricted.
Adobe Acrobat Professional DC Continuous Track Security Technical Implementation Guide
V-213121
CAT III
Adobe Acrobat Pro DC Continuous access to websites must be blocked.
Adobe Acrobat Professional DC Continuous Track Security Technical Implementation Guide
V-213122
CAT II
Adobe Acrobat Pro DC Continuous must be configured to block Flash Content.
Adobe Acrobat Professional DC Continuous Track Security Technical Implementation Guide
V-213123
CAT II
The Adobe Acrobat Pro DC Continuous Send and Track plugin for Outlook must be disabled.
Adobe Acrobat Professional DC Continuous Track Security Technical Implementation Guide
V-213131
CAT II
Adobe Acrobat Pro DC Continuous must disable the ability to store files on Acrobat.com.
Adobe Acrobat Professional DC Continuous Track Security Technical Implementation Guide
V-213132
CAT II
Adobe Acrobat Pro DC Continuous Cloud Synchronization must be disabled.
Adobe Acrobat Professional DC Continuous Track Security Technical Implementation Guide
V-213133
CAT III
Adobe Acrobat Pro DC Continuous Repair Installation must be disabled.
Adobe Acrobat Professional DC Continuous Track Security Technical Implementation Guide
V-213134
CAT III
Adobe Acrobat Pro DC Continuous third-party web connectors must be disabled.
Adobe Acrobat Professional DC Continuous Track Security Technical Implementation Guide
V-213135
CAT III
Adobe Acrobat Pro DC Continuous Webmail must be disabled.
Adobe Acrobat Professional DC Continuous Track Security Technical Implementation Guide
V-213136
CAT III
The Adobe Acrobat Pro DC Continuous Welcome Screen must be disabled.
Adobe Acrobat Professional DC Continuous Track Security Technical Implementation Guide
V-213137
CAT III
Adobe Acrobat Pro DC Continuous SharePoint and Office365 access must be disabled.
Adobe Acrobat Professional DC Continuous Track Security Technical Implementation Guide
V-213177
CAT III
Adobe Reader DC must disable the Adobe Send and Track plugin for Outlook.
Adobe Acrobat Reader DC Continuous Track Security Technical Implementation Guide
V-213178
CAT II
Adobe Reader DC must disable all service access to Document Cloud Services.
Adobe Acrobat Reader DC Continuous Track Security Technical Implementation Guide
V-213179
CAT II
Adobe Reader DC must disable Cloud Synchronization.
Adobe Acrobat Reader DC Continuous Track Security Technical Implementation Guide
V-213180
CAT III
Adobe Reader DC must disable the Adobe Repair Installation.
Adobe Acrobat Reader DC Continuous Track Security Technical Implementation Guide
V-213181
CAT II
Adobe Reader DC must disable 3rd Party Web Connectors.
Adobe Acrobat Reader DC Continuous Track Security Technical Implementation Guide
V-213182
CAT III
Adobe Reader DC must disable Acrobat Upsell.
Adobe Acrobat Reader DC Continuous Track Security Technical Implementation Guide
V-213183
CAT III
Adobe Reader DC must disable Adobe Send for Signature.
Adobe Acrobat Reader DC Continuous Track Security Technical Implementation Guide
V-213184
CAT II
Adobe Reader DC must disable access to Webmail.
Adobe Acrobat Reader DC Continuous Track Security Technical Implementation Guide
V-213185
CAT II
Adobe Reader DC must disable Online SharePoint Access.
Adobe Acrobat Reader DC Continuous Track Security Technical Implementation Guide
V-213186
CAT III
Adobe Reader DC must disable the Adobe Welcome Screen.
Adobe Acrobat Reader DC Continuous Track Security Technical Implementation Guide
V-213187
CAT III
Adobe Reader DC must disable Service Upgrades.
Adobe Acrobat Reader DC Continuous Track Security Technical Implementation Guide
V-279040
CAT II
ColdFusion must configure WebSocket Service.
Adobe ColdFusion Security Technical Implementation Guide
V-279041
CAT II
ColdFusion must have Event Gateway Services disabled when not in use.
Adobe ColdFusion Security Technical Implementation Guide
V-279042
CAT II
ColdFusion must have Remote Development Services (RDS) disabled.
Adobe ColdFusion Security Technical Implementation Guide
V-279043
CAT III
ColdFusion must have example services removed.
Adobe ColdFusion Security Technical Implementation Guide
V-279044
CAT II
ColdFusion must disable all remote and client-side debugging features, including Remote Inspection, Robust Exception Information, AJAX Debug Log Window, and Line Debugging.
Adobe ColdFusion Security Technical Implementation Guide
V-279045
CAT II
ColdFusion must have any unused mappings removed.
Adobe ColdFusion Security Technical Implementation Guide
V-279046
CAT III
ColdFusion must have Central Configuration Server (CCS) disabled.
Adobe ColdFusion Security Technical Implementation Guide
V-279047
CAT III
ColdFusion must have only approved Tomcat connectors enabled.
Adobe ColdFusion Security Technical Implementation Guide
V-279048
CAT III
ColdFusion must have Tomcat configured with deployXML disabled.
Adobe ColdFusion Security Technical Implementation Guide
V-279049
CAT III
ColdFusion must be configured with autoDeploy disabled.
Adobe ColdFusion Security Technical Implementation Guide
V-279050
CAT II
ColdFusion must be configured with secure and approved server settings to enforce application hardening, input validation, error handling, and protection against common web vulnerabilities.
Adobe ColdFusion Security Technical Implementation Guide
V-279051
CAT III
ColdFusion must have the sample data directories removed.
Adobe ColdFusion Security Technical Implementation Guide
V-279052
CAT III
ColdFusion must have the CFSTAT feature disabled when not in use.
Adobe ColdFusion Security Technical Implementation Guide
V-279053
CAT II
ColdFusion must disable the In-Memory File System.
Adobe ColdFusion Security Technical Implementation Guide
V-279106
CAT II
ColdFusion must be configured to set the cookie settings.
Adobe ColdFusion Security Technical Implementation Guide
V-279107
CAT II
ColdFusion must be configured to enable Cross-Origin Resource Sharing (CORS) to allow mobile applications to access resources from different origins securely.
Adobe ColdFusion Security Technical Implementation Guide
V-274007
CAT I
Amazon Linux 2023 must not have the vsftpd package installed.
Amazon Linux 2023 Security Technical Implementation Guide
V-274008
CAT II
Amazon Linux 2023 must not have the sendmail package installed.
Amazon Linux 2023 Security Technical Implementation Guide
V-274009
CAT II
Amazon Linux 2023 must not have the nfs-utils package installed.
Amazon Linux 2023 Security Technical Implementation Guide
V-274010
CAT II
Amazon Linux 2023 must not have the telnet-server package installed.
Amazon Linux 2023 Security Technical Implementation Guide
V-274011
CAT II
Amazon Linux 2023 must not have the gssproxy package installed.
Amazon Linux 2023 Security Technical Implementation Guide
V-274158
CAT II
Amazon Linux 2023 must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services, as defined in the Ports, Protocols, and Services Management Category Assurance List (PPSM CAL) and vulnerability assessments.
Amazon Linux 2023 Security Technical Implementation Guide
V-214239
CAT II
The Apache web server must not perform user management for hosted applications.
Apache Server 2.4 UNIX Server Security Technical Implementation Guide
V-214240
CAT II
The Apache web server must only contain services and functions necessary for operation.
Apache Server 2.4 UNIX Server Security Technical Implementation Guide
V-214241
CAT II
The Apache web server must not be a proxy server.
Apache Server 2.4 UNIX Server Security Technical Implementation Guide
V-214242
CAT I
The Apache web server must provide install options to exclude the installation of documentation, sample code, example applications, and tutorials.
Apache Server 2.4 UNIX Server Security Technical Implementation Guide
V-214243
CAT II
The Apache web server must have resource mappings set to disable the serving of certain file types.
Apache Server 2.4 UNIX Server Security Technical Implementation Guide
V-214244
CAT II
The Apache web server must allow the mappings to unused and vulnerable scripts to be removed.
Apache Server 2.4 UNIX Server Security Technical Implementation Guide
V-214245
CAT II
The Apache web server must have Web Distributed Authoring (WebDAV) disabled.
Apache Server 2.4 UNIX Server Security Technical Implementation Guide
V-214248
CAT I
Apache web server application directories, libraries, and configuration files must only be accessible to privileged users.
Apache Server 2.4 UNIX Server Security Technical Implementation Guide
V-214280
CAT II
The Apache web server must not perform user management for hosted applications.
Apache Server 2.4 UNIX Site Security Technical Implementation Guide
V-214281
CAT II
The Apache web server must have Multipurpose Internet Mail Extensions (MIME) that invoke operating system shell programs disabled.
Apache Server 2.4 UNIX Site Security Technical Implementation Guide
V-214282
CAT II
The Apache web server must allow mappings to unused and vulnerable scripts to be removed.
Apache Server 2.4 UNIX Site Security Technical Implementation Guide
V-214283
CAT II
The Apache web server must have resource mappings set to disable the serving of certain file types.
Apache Server 2.4 UNIX Site Security Technical Implementation Guide
V-214284
CAT II
Users and scripts running on behalf of users must be contained to the document root or home directory tree of the Apache web server.
Apache Server 2.4 UNIX Site Security Technical Implementation Guide
V-214318
CAT II
The Apache web server must not perform user management for hosted applications.
Apache Server 2.4 Windows Server Security Technical Implementation Guide
V-214319
CAT II
The Apache web server must only contain services and functions necessary for operation.
Apache Server 2.4 Windows Server Security Technical Implementation Guide
V-214320
CAT II
The Apache web server must not be a proxy server.
Apache Server 2.4 Windows Server Security Technical Implementation Guide
V-214321
CAT I
The Apache web server must provide install options to exclude the installation of documentation, sample code, example applications, and tutorials.
Apache Server 2.4 Windows Server Security Technical Implementation Guide
V-214322
CAT I
Apache web server application directories, libraries, and configuration files must only be accessible to privileged users.
Apache Server 2.4 Windows Server Security Technical Implementation Guide
V-214323
CAT II
The Apache web server must have resource mappings set to disable the serving of certain file types.
Apache Server 2.4 Windows Server Security Technical Implementation Guide
V-214324
CAT II
The Apache web server must allow the mappings to unused and vulnerable scripts to be removed.
Apache Server 2.4 Windows Server Security Technical Implementation Guide
V-214325
CAT II
The Apache web server must have Web Distributed Authoring (WebDAV) disabled.
Apache Server 2.4 Windows Server Security Technical Implementation Guide
V-214365
CAT II
The Apache web server must not perform user management for hosted applications.
Apache Server 2.4 Windows Site Security Technical Implementation Guide
V-214367
CAT II
The Apache web server must allow the mappings to unused and vulnerable scripts to be removed.
Apache Server 2.4 Windows Site Security Technical Implementation Guide
V-214368
CAT II
Users and scripts running on behalf of users must be contained to the document root or home directory tree of the Apache web server.
Apache Server 2.4 Windows Site Security Technical Implementation Guide
V-222950
CAT II
Stack tracing must be disabled.
Apache Tomcat Application Server 9 Security Technical Implementation Guide
V-222951
CAT II
The shutdown port must be disabled.
Apache Tomcat Application Server 9 Security Technical Implementation Guide
V-222952
CAT II
Unapproved connectors must be disabled.
Apache Tomcat Application Server 9 Security Technical Implementation Guide
V-222953
CAT III
DefaultServlet debug parameter must be disabled.
Apache Tomcat Application Server 9 Security Technical Implementation Guide
V-222954
CAT III
DefaultServlet directory listings parameter must be disabled.
Apache Tomcat Application Server 9 Security Technical Implementation Guide
V-222955
CAT II
The deployXML attribute must be set to false in hosted environments.
Apache Tomcat Application Server 9 Security Technical Implementation Guide
V-222956
CAT II
Autodeploy must be disabled.
Apache Tomcat Application Server 9 Security Technical Implementation Guide
V-222957
CAT III
xpoweredBy attribute must be disabled.
Apache Tomcat Application Server 9 Security Technical Implementation Guide
V-222958
CAT III
Example applications must be removed.
Apache Tomcat Application Server 9 Security Technical Implementation Guide
V-222959
CAT III
Tomcat default ROOT web application must be removed.
Apache Tomcat Application Server 9 Security Technical Implementation Guide
V-222960
CAT III
Documentation must be removed.
Apache Tomcat Application Server 9 Security Technical Implementation Guide
V-254608
CAT III
Apple iOS/iPadOS 16 must implement the management setting: Not allow automatic completion of Safari browser passcodes.
Apple iOS-iPadOS 16 Security Technical Implementation Guide
V-254609
CAT II
Apple iOS/iPadOS 16 must implement the management setting: Encrypt iTunes backups/Encrypt local backup.
Apple iOS-iPadOS 16 Security Technical Implementation Guide
V-254610
CAT III
Apple iOS/iPadOS 16 must implement the management setting: not allow use of Handoff.
Apple iOS-iPadOS 16 Security Technical Implementation Guide
V-254613
CAT II
Apple iOS/iPadOS 16 must implement the management setting: Disable Allow Shared Albums.
Apple iOS-iPadOS 16 Security Technical Implementation Guide
V-254614
CAT I
iPhone and iPad must have the latest available iOS/iPadOS operating system installed.
Apple iOS-iPadOS 16 Security Technical Implementation Guide
V-254620
CAT III
Apple iOS/iPadOS 16 must implement the management setting: Force Apple Watch wrist detection.
Apple iOS-iPadOS 16 Security Technical Implementation Guide
V-254621
CAT II
Apple iOS/iPadOS 16 users must complete required training.
Apple iOS-iPadOS 16 Security Technical Implementation Guide
V-257121
CAT II
Apple iOS/iPadOS 16 must implement the management setting: Encrypt iTunes backups/Encrypt local backup.
Apple iOS/iPadOS 16 BYOAD Security Technical Implementation Guide
V-257123
CAT I
iPhone and iPad must have the latest available iOS/iPadOS operating system installed.
Apple iOS/iPadOS 16 BYOAD Security Technical Implementation Guide
V-257127
CAT III
Apple iOS/iPadOS 16 must implement the management setting: force Apple Watch wrist detection.
Apple iOS/iPadOS 16 BYOAD Security Technical Implementation Guide
V-257128
CAT II
Apple iOS/iPadOS 16 users must complete required training.
Apple iOS/iPadOS 16 BYOAD Security Technical Implementation Guide
V-259779
CAT II
Apple iOS/iPadOS 17 must implement the management setting: Encrypt backups/Encrypt local backup.
Apple iOS/iPadOS 17 MDFPP 3.3 BYOAD Security Technical Implementation Guide
V-259782
CAT I
iPhone and iPad must have the latest available iOS/iPadOS operating system installed.
Apple iOS/iPadOS 17 MDFPP 3.3 BYOAD Security Technical Implementation Guide
V-259786
CAT III
Apple iOS/iPadOS 17 must implement the management setting: force Apple Watch wrist detection.
Apple iOS/iPadOS 17 MDFPP 3.3 BYOAD Security Technical Implementation Guide
V-259787
CAT II
Apple iOS/iPadOS 17 users must complete required training.
Apple iOS/iPadOS 17 MDFPP 3.3 BYOAD Security Technical Implementation Guide
V-258340
CAT III
Apple iOS/iPadOS 17 must implement the management setting: not allow automatic completion of Safari browser passcodes.
Apple iOS/iPadOS 17 Security Technical Implementation Guide
V-258341
CAT II
Apple iOS/iPadOS 17 must implement the management setting: Encrypt backups/Encrypt local backup.
Apple iOS/iPadOS 17 Security Technical Implementation Guide
V-258342
CAT III
Apple iOS/iPadOS 17 must implement the management setting: not allow use of Handoff.
Apple iOS/iPadOS 17 Security Technical Implementation Guide
V-258343
CAT III
Apple iOS/iPadOS 17 must implement the management setting: not allow use of iPhone widgets on Mac.
Apple iOS/iPadOS 17 Security Technical Implementation Guide
V-258347
CAT I
iPhone and iPad must have the latest available iOS/iPadOS operating system installed.
Apple iOS/iPadOS 17 Security Technical Implementation Guide
V-258353
CAT III
Apple iOS/iPadOS 17 must implement the management setting: force Apple Watch wrist detection.
Apple iOS/iPadOS 17 Security Technical Implementation Guide
V-258354
CAT II
Apple iOS/iPadOS 17 users must complete required training.
Apple iOS/iPadOS 17 Security Technical Implementation Guide
V-268027
CAT III
Apple iOS/iPadOS 18 must implement the management setting: not allow automatic completion of Safari browser passcodes.
Apple iOS/iPadOS 18 Security Technical Implementation Guide
V-268028
CAT II
Apple iOS/iPadOS 18 must implement the management setting: encrypt backups/Encrypt local backup.
Apple iOS/iPadOS 18 Security Technical Implementation Guide
V-268029
CAT III
Apple iOS/iPadOS 18 must implement the management setting: not allow use of Handoff.
Apple iOS/iPadOS 18 Security Technical Implementation Guide
V-268030
CAT III
Apple iOS/iPadOS 18 must implement the management setting: not allow use of iPhone widgets on Mac.
Apple iOS/iPadOS 18 Security Technical Implementation Guide
V-268034
CAT I
iPhone and iPad must have the latest available iOS/iPadOS operating system installed.
Apple iOS/iPadOS 18 Security Technical Implementation Guide
V-268040
CAT III
Apple iOS/iPadOS 18 must implement the management setting: force Apple Watch wrist detection.
Apple iOS/iPadOS 18 Security Technical Implementation Guide
V-268041
CAT II
Apple iOS/iPadOS 18 users must complete required training.
Apple iOS/iPadOS 18 Security Technical Implementation Guide
V-278787
CAT III
Apple iOS/iPadOS 26 must implement the management setting: not allow automatic completion of Safari browser passcodes.
Apple iOS/iPadOS 26 Security Technical Implementation Guide
V-278788
CAT II
Apple iOS/iPadOS 26 must implement the management setting: encrypt backups/Encrypt local backup.
Apple iOS/iPadOS 26 Security Technical Implementation Guide
V-278789
CAT III
Apple iOS/iPadOS 26 must implement the management setting: not allow use of Handoff.
Apple iOS/iPadOS 26 Security Technical Implementation Guide
V-278790
CAT III
Apple iOS/iPadOS 26 must implement the management setting: not allow use of iPhone widgets on Mac.
Apple iOS/iPadOS 26 Security Technical Implementation Guide
V-278793
CAT I
iPhone and iPad must have the latest available iOS/iPadOS operating system installed.
Apple iOS/iPadOS 26 Security Technical Implementation Guide
V-278799
CAT III
Apple iOS/iPadOS 26 must implement the management setting: force Apple Watch wrist detection.
Apple iOS/iPadOS 26 Security Technical Implementation Guide
V-278800
CAT II
Apple iOS/iPadOS 26 users must complete required training.
Apple iOS/iPadOS 26 Security Technical Implementation Guide
V-252479
CAT II
The macOS system must be configured to disable SMB File Sharing unless it is required.
Apple macOS 12 (Monterey) Security Technical Implementation Guide
V-252480
CAT II
The macOS system must be configured to disable the Network File System (NFS) daemon unless it is required.
Apple macOS 12 (Monterey) Security Technical Implementation Guide
V-252481
CAT II
The macOS system must be configured to disable Location Services.
Apple macOS 12 (Monterey) Security Technical Implementation Guide
V-252482
CAT II
The macOS system must be configured to disable Bonjour multicast advertising.
Apple macOS 12 (Monterey) Security Technical Implementation Guide
V-252483
CAT II
The macOS system must be configured to disable the UUCP service.
Apple macOS 12 (Monterey) Security Technical Implementation Guide
V-252484
CAT II
The macOS system must be configured to disable Internet Sharing.
Apple macOS 12 (Monterey) Security Technical Implementation Guide
V-252485
CAT II
The macOS system must be configured to disable Web Sharing.
Apple macOS 12 (Monterey) Security Technical Implementation Guide
V-252486
CAT III
The macOS system must be configured to disable AirDrop.
Apple macOS 12 (Monterey) Security Technical Implementation Guide
V-252487
CAT III
The macOS system must be configured to disable the iCloud Calendar services.
Apple macOS 12 (Monterey) Security Technical Implementation Guide
V-252488
CAT III
The macOS system must be configured to disable the iCloud Reminders services.
Apple macOS 12 (Monterey) Security Technical Implementation Guide
V-252489
CAT III
The macOS system must be configured to disable iCloud Address Book services.
Apple macOS 12 (Monterey) Security Technical Implementation Guide
V-252490
CAT III
The macOS system must be configured to disable the Mail iCloud services.
Apple macOS 12 (Monterey) Security Technical Implementation Guide
V-252491
CAT III
The macOS system must be configured to disable the iCloud Notes services.
Apple macOS 12 (Monterey) Security Technical Implementation Guide
V-252492
CAT II
The macOS system must cover or disable the built-in or attached camera when not in use.
Apple macOS 12 (Monterey) Security Technical Implementation Guide
V-252493
CAT II
The macOS system must be configured to disable Siri and dictation.
Apple macOS 12 (Monterey) Security Technical Implementation Guide
V-252497
CAT II
The macOS system must be configured to disable the system preference pane for Internet Accounts.
Apple macOS 12 (Monterey) Security Technical Implementation Guide
V-252498
CAT II
The macOS system must be configured to disable the Cloud Setup services.
Apple macOS 12 (Monterey) Security Technical Implementation Guide
V-252499
CAT II
The macOS system must be configured to disable the Privacy Setup services.
Apple macOS 12 (Monterey) Security Technical Implementation Guide
V-252500
CAT II
The macOS system must be configured to disable the Cloud Storage Setup services.
Apple macOS 12 (Monterey) Security Technical Implementation Guide
V-252502
CAT II
The macOS system must be configured to disable the Siri Setup services.
Apple macOS 12 (Monterey) Security Technical Implementation Guide
V-252503
CAT II
The macOS system must disable iCloud Keychain synchronization.
Apple macOS 12 (Monterey) Security Technical Implementation Guide
V-252504
CAT II
The macOS system must disable iCloud document synchronization.
Apple macOS 12 (Monterey) Security Technical Implementation Guide
V-252505
CAT II
The macOS system must disable iCloud bookmark synchronization.
Apple macOS 12 (Monterey) Security Technical Implementation Guide
V-252506
CAT II
The macOS system must disable iCloud photo library.
Apple macOS 12 (Monterey) Security Technical Implementation Guide
V-252508
CAT II
The macOS system must be configured to disable the system preference pane for TouchID.
Apple macOS 12 (Monterey) Security Technical Implementation Guide
V-252509
CAT II
The macOS system must be configured to disable the system preference pane for Wallet and ApplePay.
Apple macOS 12 (Monterey) Security Technical Implementation Guide
V-252510
CAT II
The macOS system must be configured to disable the system preference pane for Siri.
Apple macOS 12 (Monterey) Security Technical Implementation Guide
V-252540
CAT II
The macOS system must be configured to disable prompts to configure Touch ID.
Apple macOS 12 (Monterey) Security Technical Implementation Guide
V-252541
CAT III
The macOS system must be configured to disable prompts to configure ScreenTime.
Apple macOS 12 (Monterey) Security Technical Implementation Guide
V-252542
CAT II
The macOS system must be configured to disable promts to configure Unlock with Watch.
Apple macOS 12 (Monterey) Security Technical Implementation Guide
V-252543
CAT III
The macOS system must be configured to prevent activity continuation between Apple Devices.
Apple macOS 12 (Monterey) Security Technical Implementation Guide
V-252544
CAT II
The macOS system must be configured to prevent password proximity sharing requests from nearby Apple Devices.
Apple macOS 12 (Monterey) Security Technical Implementation Guide
V-252545
CAT II
The macOS system must be configured to prevent users from erasing all system content and settings.
Apple macOS 12 (Monterey) Security Technical Implementation Guide
V-257185
CAT II
The macOS system must be configured to disable SMB File Sharing unless it is required.
Apple macOS 13 (Ventura) Security Technical Implementation Guide
V-257186
CAT II
The macOS system must be configured to disable the Network File System (NFS) daemon unless it is required.
Apple macOS 13 (Ventura) Security Technical Implementation Guide
V-257187
CAT II
The macOS system must be configured to disable Location Services.
Apple macOS 13 (Ventura) Security Technical Implementation Guide
V-257188
CAT II
The macOS system must be configured to disable Bonjour multicast advertising.
Apple macOS 13 (Ventura) Security Technical Implementation Guide
V-257189
CAT II
The macOS system must be configured to disable the UUCP service.
Apple macOS 13 (Ventura) Security Technical Implementation Guide
V-257190
CAT II
The macOS system must be configured to disable Internet Sharing.
Apple macOS 13 (Ventura) Security Technical Implementation Guide
V-257191
CAT II
The macOS system must be configured to disable Web Sharing.
Apple macOS 13 (Ventura) Security Technical Implementation Guide
V-257192
CAT III
The macOS system must be configured to disable AirDrop.
Apple macOS 13 (Ventura) Security Technical Implementation Guide
V-257193
CAT III
The macOS system must be configured to disable the iCloud Calendar services.
Apple macOS 13 (Ventura) Security Technical Implementation Guide
V-257194
CAT III
The macOS system must be configured to disable the iCloud Reminders services.
Apple macOS 13 (Ventura) Security Technical Implementation Guide
V-257195
CAT III
The macOS system must be configured to disable iCloud Address Book services.
Apple macOS 13 (Ventura) Security Technical Implementation Guide
V-257196
CAT III
The macOS system must be configured to disable the iCloud Mail services.
Apple macOS 13 (Ventura) Security Technical Implementation Guide
V-257197
CAT III
The macOS system must be configured to disable the iCloud Notes services.
Apple macOS 13 (Ventura) Security Technical Implementation Guide
V-257198
CAT II
The macOS system must cover or disable the built-in or attached camera when not in use.
Apple macOS 13 (Ventura) Security Technical Implementation Guide
V-257199
CAT II
The macOS system must be configured to disable Siri and dictation.
Apple macOS 13 (Ventura) Security Technical Implementation Guide
V-257203
CAT II
The macOS system must be configured to disable the system preference pane for Internet Accounts.
Apple macOS 13 (Ventura) Security Technical Implementation Guide
V-257204
CAT II
The macOS system must be configured to disable the Cloud Setup services.
Apple macOS 13 (Ventura) Security Technical Implementation Guide
V-257205
CAT II
The macOS system must be configured to disable the Privacy Setup services.
Apple macOS 13 (Ventura) Security Technical Implementation Guide
V-257206
CAT II
The macOS system must be configured to disable the Cloud Storage Setup services.
Apple macOS 13 (Ventura) Security Technical Implementation Guide
V-257208
CAT II
The macOS system must be configured to disable the Siri Setup services.
Apple macOS 13 (Ventura) Security Technical Implementation Guide
V-257209
CAT II
The macOS system must disable iCloud Keychain synchronization.
Apple macOS 13 (Ventura) Security Technical Implementation Guide
V-257210
CAT II
The macOS system must disable iCloud Document synchronization.
Apple macOS 13 (Ventura) Security Technical Implementation Guide
V-257211
CAT II
The macOS system must disable iCloud Bookmark synchronization.
Apple macOS 13 (Ventura) Security Technical Implementation Guide
V-257212
CAT II
The macOS system must disable the iCloud Photo Library.
Apple macOS 13 (Ventura) Security Technical Implementation Guide
V-257214
CAT II
The macOS system must be configured to disable the system preference pane for TouchID and Password.
Apple macOS 13 (Ventura) Security Technical Implementation Guide
V-257215
CAT II
The macOS system must be configured to disable the system preference pane for Wallet and ApplePay.
Apple macOS 13 (Ventura) Security Technical Implementation Guide
V-257216
CAT II
The macOS system must be configured to disable the system preference pane for Siri.
Apple macOS 13 (Ventura) Security Technical Implementation Guide
V-257246
CAT II
The macOS system must be configured to disable prompts to configure Touch ID.
Apple macOS 13 (Ventura) Security Technical Implementation Guide
V-257247
CAT III
The macOS system must be configured to disable prompts to configure ScreenTime.
Apple macOS 13 (Ventura) Security Technical Implementation Guide
V-257248
CAT II
The macOS system must be configured to disable prompts to configure Unlock with Watch.
Apple macOS 13 (Ventura) Security Technical Implementation Guide
V-257249
CAT III
The macOS system must be configured to prevent activity continuation between Apple devices.
Apple macOS 13 (Ventura) Security Technical Implementation Guide
V-257250
CAT II
The macOS system must be configured to prevent password proximity sharing requests from nearby Apple devices.
Apple macOS 13 (Ventura) Security Technical Implementation Guide
V-257251
CAT II
The macOS system must be configured to prevent users from erasing all system content and settings.
Apple macOS 13 (Ventura) Security Technical Implementation Guide
V-259480
CAT II
The macOS system must disable Location Services.
Apple macOS 14 (Sonoma) Security Technical Implementation Guide
V-259481
CAT II
The macOS system must disable Bonjour multicast.
Apple macOS 14 (Sonoma) Security Technical Implementation Guide
V-259483
CAT II
The macOS system must disable Internet Sharing.
Apple macOS 14 (Sonoma) Security Technical Implementation Guide
V-259486
CAT II
The macOS system must disable FaceTime.app.
Apple macOS 14 (Sonoma) Security Technical Implementation Guide
V-259487
CAT II
The macOS system must disable the iCloud Calendar services.
Apple macOS 14 (Sonoma) Security Technical Implementation Guide
V-259488
CAT II
The macOS system must disable iCloud Reminders.
Apple macOS 14 (Sonoma) Security Technical Implementation Guide
V-259489
CAT II
The macOS system must disable iCloud Address Book.
Apple macOS 14 (Sonoma) Security Technical Implementation Guide
V-259490
CAT II
The macOS system must disable iCloud Mail.
Apple macOS 14 (Sonoma) Security Technical Implementation Guide
V-259491
CAT II
The macOS system must disable iCloud Notes.
Apple macOS 14 (Sonoma) Security Technical Implementation Guide
V-259492
CAT II
The macOS system must disable the camera.
Apple macOS 14 (Sonoma) Security Technical Implementation Guide
V-259493
CAT II
The macOS system must disable Siri.
Apple macOS 14 (Sonoma) Security Technical Implementation Guide
V-259496
CAT II
The macOS system must disable Apple ID setup during Setup Assistant.
Apple macOS 14 (Sonoma) Security Technical Implementation Guide
V-259497
CAT II
The macOS system must disable Privacy Setup services during Setup Assistant.
Apple macOS 14 (Sonoma) Security Technical Implementation Guide
V-259498
CAT II
The macOS system must disable iCloud Storage Setup during Setup Assistant.
Apple macOS 14 (Sonoma) Security Technical Implementation Guide
V-259500
CAT II
The macOS system must disable Siri Setup during Setup Assistant.
Apple macOS 14 (Sonoma) Security Technical Implementation Guide