mirror of
https://github.com/usnistgov/macos_security.git
synced 2026-02-03 14:03:24 +00:00
refactor[rules]pwpolicy updates
Removed 800-53 and 800-171 tags Updated discussion to reflect NIST SP 800-63 and Executive Order M-22-09
This commit is contained in:
@@ -4,8 +4,8 @@ discussion: |
|
||||
The macOS _MUST_ be configured to require at least one numeric character be used when a password is created.
|
||||
|
||||
This rule enforces password complexity by requiring users to set passwords that are less vulnerable to malicious users.
|
||||
|
||||
NOTE: The guidance for password based authentication in NIST 800-53 (Rev 5) and NIST 800-63B state that complexity rules should be organizationally defined. The values defined are based off of common complexity values. But your organization may define its own password complexity rules.
|
||||
|
||||
NOTE: To comply with Executive Order 14028, “Improving the Nation's Cybersecurity”, OMB M-22-09, “Moving the U.S. Government Toward Zero Trust Cybersecurity Principles”, and NIST SP-800-63b, “Digital Identity Guidelines: Authentication and Lifecycle Management” federal, military, and intelligence communities must adopt the following configuration settings. Password policies must not require the use of complexity policies such as upper characters, lower characters, or special characters. Password policies must also not require the use of regular rotation. Password policies should define a minimum length. Multifactor authentication should be used where ever possible.
|
||||
check: |
|
||||
/usr/bin/pwpolicy -getaccountpolicies 2> /dev/null | /usr/bin/tail +2 | /usr/bin/xmllint --xpath '//dict/key[text()="policyIdentifier"]/following-sibling::*[1]/text()' - | /usr/bin/grep "requireAlphanumeric" -c
|
||||
result:
|
||||
@@ -43,13 +43,6 @@ references:
|
||||
macOS:
|
||||
- '15.0'
|
||||
tags:
|
||||
- 800-171
|
||||
- 800-53r4_low
|
||||
- 800-53r4_moderate
|
||||
- 800-53r4_high
|
||||
- 800-53r5_low
|
||||
- 800-53r5_moderate
|
||||
- 800-53r5_high
|
||||
- cis_lvl2
|
||||
- cisv8
|
||||
- cnssi-1253_low
|
||||
|
||||
@@ -5,7 +5,7 @@ discussion: |
|
||||
|
||||
This rule enforces password complexity by requiring users to set passwords that are less vulnerable to malicious users.
|
||||
|
||||
NOTE: The guidance for password based authentication in NIST 800-53 (Rev 5) and NIST 800-63B state that complexity rules should be organizationally defined. The values defined are based off of common complexity values. But your organization may define its own password complexity rules.
|
||||
NOTE: To comply with Executive Order 14028, “Improving the Nation's Cybersecurity”, OMB M-22-09, “Moving the U.S. Government Toward Zero Trust Cybersecurity Principles”, and NIST SP-800-63b, “Digital Identity Guidelines: Authentication and Lifecycle Management” federal, military, and intelligence communities must adopt the following configuration settings. Password policies must not require the use of complexity policies such as upper characters, lower characters, or special characters. Password policies must also not require the use of regular rotation. Password policies should define a minimum length. Multifactor authentication should be used where ever possible.
|
||||
|
||||
NOTE: The configuration profile generated must be installed from an MDM server.
|
||||
check: |
|
||||
@@ -53,13 +53,6 @@ odv:
|
||||
cis_lvl2: ^(?=.*[A-Z])(?=.*[a-z])(?=.*[0-9]).*$
|
||||
stig: ^(?=.*[A-Z])(?=.*[a-z])(?=.*[0-9]).*$
|
||||
tags:
|
||||
- 800-171
|
||||
- 800-53r4_low
|
||||
- 800-53r4_moderate
|
||||
- 800-53r4_high
|
||||
- 800-53r5_low
|
||||
- 800-53r5_moderate
|
||||
- 800-53r5_high
|
||||
- cis_lvl2
|
||||
- cisv8
|
||||
- cnssi-1253_low
|
||||
|
||||
@@ -5,7 +5,7 @@ discussion: |
|
||||
|
||||
This rule enforces password complexity by requiring users to set passwords that are less vulnerable to malicious users.
|
||||
|
||||
NOTE: The guidance for password based authentication in NIST 800-53 (Rev 5) and NIST 800-63B state that complexity rules should be organizationally defined. The values defined are based off of common complexity values. But your organization may define its own password complexity rules.
|
||||
NOTE: To comply with Executive Order 14028, “Improving the Nation's Cybersecurity”, OMB M-22-09, “Moving the U.S. Government Toward Zero Trust Cybersecurity Principles”, and NIST SP-800-63b, “Digital Identity Guidelines: Authentication and Lifecycle Management” federal, military, and intelligence communities must adopt the following configuration settings. Password policies must not require the use of complexity policies such as upper characters, lower characters, or special characters. Password policies must also not require the use of regular rotation. Password policies should define a minimum length. Multifactor authentication should be used where ever possible.
|
||||
|
||||
NOTE: macOS 14 supports password policy complexity with custom regex deployed with a mobileconfig file. To use a mobileconfig file use *pwpolicy_custom_regex_enforce*.
|
||||
check: |
|
||||
@@ -69,7 +69,6 @@ odv:
|
||||
hint: Number of lowercase characters.
|
||||
recommended: 1
|
||||
tags:
|
||||
- none
|
||||
- cnssi-1253_moderate
|
||||
- cnssi-1253_low
|
||||
- cnssi-1253_high
|
||||
|
||||
@@ -5,9 +5,7 @@ discussion: |
|
||||
|
||||
This rule ensures that users are forced to change their passwords frequently enough to prevent malicious users from gaining and maintaining access to the system.
|
||||
|
||||
NOTE: The guidance for password based authentication in NIST 800-53 (Rev 5) and NIST 800-63B state that complexity rules should be organizationally defined. The values defined are based off of common complexity values. But your organization may define its own password complexity rules.
|
||||
|
||||
NOTE: To comply with Executive Order 14028, “Improving the Nation's Cybersecurity”, OMB M-22-09, “Moving the U.S. Government Toward Zero Trust Cybersecurity Principles”, and NIST SP-800-63b, “Digital Identity Guidelines: Authentication and Lifecycle Management” federal, military, and intelligence communities must adopt the following configuration settings. Password policies must not require use of special characters or regular rotation.
|
||||
NOTE: To comply with Executive Order 14028, “Improving the Nation's Cybersecurity”, OMB M-22-09, “Moving the U.S. Government Toward Zero Trust Cybersecurity Principles”, and NIST SP-800-63b, “Digital Identity Guidelines: Authentication and Lifecycle Management” federal, military, and intelligence communities must adopt the following configuration settings. Password policies must not require the use of complexity policies such as upper characters, lower characters, or special characters. Password policies must also not require the use of regular rotation. Password policies should define a minimum length. Multifactor authentication should be used where ever possible.
|
||||
check: |
|
||||
/usr/bin/pwpolicy -getaccountpolicies 2> /dev/null | /usr/bin/tail +2 | /usr/bin/xmllint --xpath '//dict/key[text()="policyAttributeExpiresEveryNDays"]/following-sibling::*[1]/text()' -
|
||||
result:
|
||||
@@ -49,13 +47,6 @@ odv:
|
||||
cis_lvl2: 365
|
||||
stig: 60
|
||||
tags:
|
||||
- 800-171
|
||||
- 800-53r4_low
|
||||
- 800-53r4_moderate
|
||||
- 800-53r4_high
|
||||
- 800-53r5_low
|
||||
- 800-53r5_moderate
|
||||
- 800-53r5_high
|
||||
- cis_lvl1
|
||||
- cis_lvl2
|
||||
- cisv8
|
||||
|
||||
@@ -5,7 +5,7 @@ discussion: |
|
||||
|
||||
This rule enforces password complexity by requiring users to set passwords that are less vulnerable to malicious users.
|
||||
|
||||
NOTE: The guidance for password based authentication in NIST 800-53 (Rev 5) and NIST 800-63B state that complexity rules should be organizationally defined. The values defined are based off of common complexity values. But your organization may define its own password complexity rules.
|
||||
NOTE: To comply with Executive Order 14028, “Improving the Nation's Cybersecurity”, OMB M-22-09, “Moving the U.S. Government Toward Zero Trust Cybersecurity Principles”, and NIST SP-800-63b, “Digital Identity Guidelines: Authentication and Lifecycle Management” federal, military, and intelligence communities must adopt the following configuration settings. Password policies must not require the use of complexity policies such as upper characters, lower characters, or special characters. Password policies must also not require the use of regular rotation. Password policies should define a minimum length. Multifactor authentication should be used where ever possible.
|
||||
check: |
|
||||
/usr/bin/pwpolicy -getaccountpolicies 2> /dev/null | /usr/bin/tail +2 | /usr/bin/xmllint --xpath 'boolean(//*[contains(text(),"policyAttributePassword matches '\''.{$ODV,}'\''")])' -
|
||||
result:
|
||||
|
||||
@@ -5,7 +5,7 @@ discussion: |
|
||||
|
||||
This rule discourages users from cycling through their previous passwords to get back to a preferred one.
|
||||
|
||||
NOTE: The guidance for password based authentication in NIST 800-53 (Rev 5) and NIST 800-63B state that complexity rules should be organizationally defined. The values defined are based off of common complexity values. But your organization may define its own password complexity rules.
|
||||
NOTE: To comply with Executive Order 14028, “Improving the Nation's Cybersecurity”, OMB M-22-09, “Moving the U.S. Government Toward Zero Trust Cybersecurity Principles”, and NIST SP-800-63b, “Digital Identity Guidelines: Authentication and Lifecycle Management” federal, military, and intelligence communities must adopt the following configuration settings. Password policies must not require the use of complexity policies such as upper characters, lower characters, or special characters. Password policies must also not require the use of regular rotation. Password policies should define a minimum length. Multifactor authentication should be used where ever possible.
|
||||
check: |
|
||||
/usr/bin/pwpolicy -getaccountpolicies 2> /dev/null | /usr/bin/tail +2 | /usr/bin/xmllint --xpath '//dict/key[text()="policyAttributeMinimumLifetimeHours"]/following-sibling::integer[1]/text()' - | /usr/bin/awk '{ if ($1 >= $ODV ) {print "yes"} else {print "no"}}'
|
||||
result:
|
||||
@@ -67,13 +67,6 @@ odv:
|
||||
recommended: 24
|
||||
stig: 24
|
||||
tags:
|
||||
- 800-171
|
||||
- 800-53r4_low
|
||||
- 800-53r4_moderate
|
||||
- 800-53r4_high
|
||||
- 800-53r5_low
|
||||
- 800-53r5_moderate
|
||||
- 800-53r5_high
|
||||
- cisv8
|
||||
- cnssi-1253_low
|
||||
- cnssi-1253_high
|
||||
|
||||
@@ -6,6 +6,8 @@ discussion: |
|
||||
If the operating system allows users to select passwords based on dictionary words, this increases the window of opportunity for a malicious user to guess the password.
|
||||
|
||||
To prevent users from using dictionary words for passwords, many operating systems can be integrated with an enterprise-level directory service that meets or exceeds this requirement.
|
||||
|
||||
NOTE: To comply with Executive Order 14028, “Improving the Nation's Cybersecurity”, OMB M-22-09, “Moving the U.S. Government Toward Zero Trust Cybersecurity Principles”, and NIST SP-800-63b, “Digital Identity Guidelines: Authentication and Lifecycle Management” federal, military, and intelligence communities must adopt the following configuration settings. Password policies must not require the use of complexity policies such as upper characters, lower characters, or special characters. Password policies must also not require the use of regular rotation. Password policies should define a minimum length. Multifactor authentication should be used where ever possible.
|
||||
check: |
|
||||
For systems not requiring mandatory smart card authentication or those that are not bound to a directory, the technology does not support this requirement. This is an applicable-does not meet finding.
|
||||
fix: |
|
||||
@@ -27,6 +29,5 @@ macOS:
|
||||
- '15.0'
|
||||
tags:
|
||||
- permanent
|
||||
- srg
|
||||
mobileconfig: false
|
||||
mobileconfig_info:
|
||||
|
||||
@@ -5,7 +5,9 @@ discussion: |
|
||||
|
||||
This rule enforces password complexity by requiring users to set passwords that are less vulnerable to malicious users.
|
||||
|
||||
NOTE: The guidance for password based authentication in NIST 800-53 (Rev 5) and NIST 800-63B state that complexity rules should be organizationally defined. The values defined are based off of common complexity values. But your organization may define its own password complexity rules.
|
||||
NOTE: To comply with Executive Order 14028, “Improving the Nation's Cybersecurity”, OMB M-22-09, “Moving the U.S. Government Toward Zero Trust Cybersecurity Principles”, and NIST SP-800-63b, “Digital Identity Guidelines: Authentication and Lifecycle Management” federal, military, and intelligence communities must adopt the following configuration settings. Password policies must not require the use of complexity policies such as upper characters, lower characters, or special characters. Password policies must also not require the use of regular rotation. Password policies should define a minimum length. Multifactor authentication should be used where ever possible.
|
||||
|
||||
NOTE: pwpolicy_simple_sequence_disable prevents use of passwords which are regularly found in compromised password lists.
|
||||
check: |
|
||||
/usr/bin/pwpolicy -getaccountpolicies 2> /dev/null | /usr/bin/tail +2 | /usr/bin/xmllint --xpath '//dict/key[text()="policyIdentifier"]/following-sibling::*[1]/text()' - | /usr/bin/grep "allowSimple" -c
|
||||
result:
|
||||
|
||||
@@ -7,9 +7,7 @@ discussion: |
|
||||
|
||||
This rule enforces password complexity by requiring users to set passwords that are less vulnerable to malicious users.
|
||||
|
||||
NOTE: The guidance for password based authentication in NIST 800-53 (Rev 5) and NIST 800-63B state that complexity rules should be organizationally defined. The values defined are based off of common complexity values. But your organization may define its own password complexity rules.
|
||||
|
||||
NOTE: To comply with Executive Order 14028, “Improving the Nation's Cybersecurity”, OMB M-22-09, “Moving the U.S. Government Toward Zero Trust Cybersecurity Principles”, and NIST SP-800-63b, “Digital Identity Guidelines: Authentication and Lifecycle Management” federal, military, and intelligence communities must adopt the following configuration settings. Password policies must not require use of special characters or regular rotation.
|
||||
NOTE: To comply with Executive Order 14028, “Improving the Nation's Cybersecurity”, OMB M-22-09, “Moving the U.S. Government Toward Zero Trust Cybersecurity Principles”, and NIST SP-800-63b, “Digital Identity Guidelines: Authentication and Lifecycle Management” federal, military, and intelligence communities must adopt the following configuration settings. Password policies must not require the use of complexity policies such as upper characters, lower characters, or special characters. Password policies must also not require the use of regular rotation. Password policies should define a minimum length. Multifactor authentication should be used where ever possible.
|
||||
check: |
|
||||
/usr/bin/pwpolicy -getaccountpolicies 2> /dev/null | /usr/bin/tail +2 | /usr/bin/xmllint --xpath 'boolean(//*[contains(text(),"policyAttributePassword matches '\''(.*[^a-zA-Z0-9].*){$ODV,}'\''")])' -
|
||||
result:
|
||||
@@ -50,13 +48,6 @@ odv:
|
||||
cis_lvl2: 1
|
||||
stig: 1
|
||||
tags:
|
||||
- 800-171
|
||||
- 800-53r4_low
|
||||
- 800-53r4_moderate
|
||||
- 800-53r4_high
|
||||
- 800-53r5_low
|
||||
- 800-53r5_moderate
|
||||
- 800-53r5_high
|
||||
- cis_lvl2
|
||||
- cisv8
|
||||
- cnssi-1253_low
|
||||
|
||||
@@ -5,7 +5,7 @@ discussion: |
|
||||
|
||||
This rule enforces password complexity by requiring users to set passwords that are less vulnerable to malicious users.
|
||||
|
||||
NOTE: The guidance for password based authentication in NIST 800-53 (Rev 5) and NIST 800-63B state that complexity rules should be organizationally defined. The values defined are based off of common complexity values. But your organization may define its own password complexity rules.
|
||||
NOTE: To comply with Executive Order 14028, “Improving the Nation's Cybersecurity”, OMB M-22-09, “Moving the U.S. Government Toward Zero Trust Cybersecurity Principles”, and NIST SP-800-63b, “Digital Identity Guidelines: Authentication and Lifecycle Management” federal, military, and intelligence communities must adopt the following configuration settings. Password policies must not require the use of complexity policies such as upper characters, lower characters, or special characters. Password policies must also not require the use of regular rotation. Password policies should define a minimum length. MFA authentication should be used whereever possible.
|
||||
|
||||
NOTE: macOS 14 supports password policy complexity with custom regex deployed with a mobileconfig file. To use a mobileconfig file use *pwpolicy_custom_regex_enforce*.
|
||||
check: |
|
||||
|
||||
Reference in New Issue
Block a user