Skip to content

Commit 593cc8f

Browse files
committed
Merge branch 'dev_ios16_readme' into ios_16
2 parents 5d01f40 + 0eb7ce8 commit 593cc8f

File tree

5 files changed

+98
-107
lines changed

5 files changed

+98
-107
lines changed

CHANGELOG.adoc

Lines changed: 0 additions & 23 deletions
This file was deleted.

CHANGELOG.md

Lines changed: 32 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,32 @@
1+
# Changelog
2+
3+
This document provides a high-level view of the changes to the macOS Security Compliance Project.
4+
5+
## [iOS 16, Revision 2.1] - 2025-06-XX
6+
* Rules
7+
* bug fixes
8+
* Scripts
9+
* generate_guidance
10+
* bug fixes
11+
* generate_scap
12+
* bug fixes
13+
14+
## [iOS 16, Revision 2.0] - 2024-04-24
15+
16+
* Rules
17+
* Modified Rules
18+
* os_allow_contacts_read_managed_sources_unmanaged_destinations_disable
19+
* os_application_allow_list
20+
* os_disallow_enterprise_app_trust
21+
* os_safari_cookies_set
22+
* os_safari_force_fraud_warning_enable
23+
* os_supervised_mdm_require
24+
* os_untrusted_tls_disable
25+
* pwpolicy_force_pin_enable
26+
* Supplemental
27+
* supplemental_cis_manual
28+
* supplemental_stig
29+
30+
## [iOS 16, Revision 1.0] - 2023-09-21
31+
32+
* Initial Public release
Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -1,31 +1,31 @@
1-
== Contributing
1+
## Contributing
22

3-
=== Engage
4-
Contribute new content, share feedback and ask questions about resources in the repository using the https://github.com/usnistgov/macos_security/issues/new[Issues feature].
3+
### Engage
4+
Contribute new content, share feedback and ask questions about resources in the repository using the [Issues feature](https://github.com/usnistgov/macos_security/issues/new).
55

6-
=== Operating Rules
6+
### Operating Rules
77
These operating rules describe and govern NIST’s management of this repository and contributors’ responsibilities. NIST reserves the right to modify this policy at any time.
88

9-
=== Criteria for Contributions and Feedback
10-
This is a moderated platform. NIST will only accept contributions that are contributed per the terms of the license file. Contributors may submit links or materials for hosting in the repository. Upon submission, materials will be public and considered publicly available information, unless noted in the license file.
9+
### Criteria for Contributions and Feedback
10+
This is a moderated platform. NIST will only accept contributions that are contributed per the terms of the license file. Contributors may submit links or materials for hosting in the repository. Upon submission, materials will be public and considered publicly available information, unless noted in the license file.
1111

12-
NIST reserves the right to reject, remove, or edit any contribution or feedback, including anything that:
13-
* states or implies NIST endorsement of any entities, services, or products;
14-
* is inaccurate;
15-
* contains abusive or vulgar content, spam, hate speech, personal attacks, or similar content;
16-
* is clearly "off topic";
12+
NIST reserves the right to reject, remove, or edit any contribution or feedback, including anything that:
13+
* states or implies NIST endorsement of any entities, services, or products;
14+
* is inaccurate;
15+
* contains abusive or vulgar content, spam, hate speech, personal attacks, or similar content;
16+
* is clearly "off topic";
1717
* makes unsupported accusations;
18-
* includes personally identifiable or business identifiable information according to Department of Commerce Office of Privacy and Open Government (http://www.osec.doc.gov/opog/privacy/PII_BII.html[guidelines]; or,
18+
* includes personally identifiable or business identifiable information according to Department of Commerce Office of Privacy and Open Government [guidelines](http://www.osec.doc.gov/opog/privacy/PII_BII.html); or,
1919
* contains .exe or .jar file types.
2020

2121
_These file types will not be hosted in the NIST repository; instead, NIST may link to these if hosted elsewhere._
2222

23-
=== Contributor Responsibilities
23+
### Contributor Responsibilities
2424
NIST also reserves the right to reject or remove contributions from the repository if the contributor fails to carry out any of the following responsibilities:
2525

2626
* following the contribution instructions;
2727
* responding to feedback from other repository users in a timely manner;
2828
* responding to NIST representatives in a timely manner;
2929
* keeping contributions and contributor GitHub username up to date
3030

31-
*GitHub Help:* If you're having trouble with these instructions, and need more information about GitHub, pull requests, and issues, visit GitHub's Help https://help.github.com/categories/collaborating-with-issues-and-pull-requests/[page].
31+
**GitHub Help:** If you're having trouble with these instructions, and need more information about GitHub, pull requests, and issues, visit GitHub's Help [page](https://help.github.com/categories/collaborating-with-issues-and-pull-requests/).

README.adoc

Lines changed: 0 additions & 70 deletions
This file was deleted.

README.md

Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
![Alt text](templates/images/mscp_banner_outline.png)
2+
3+
![Alt text](https://badgen.net/badge/icon/apple?icon=apple&label)
4+
![Alt text](https://badgen.net/badge/icon/16.0?icon=apple&label)
5+
6+
> [!IMPORTANT]
7+
> We recommend working off of one of the OS branches, rather than the `main` branch.
8+
9+
The macOS Security Compliance Project is an link:LICENSE.md[open source] effort to provide a programmatic approach to generating security guidance. The configuration settings in this document were derived from National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53, _Security and Privacy Controls for Information Systems and Organizations_, Revision 5. This is a joint project of federal operational IT Security staff from the National Institute of Standards and Technology (NIST), National Aeronautics and Space Administration (NASA), Defense Information Systems Agency (DISA), and Los Alamos National Laboratory (LANL).
10+
11+
This project is the technical implementation of NIST Special Publication, 800-219 (Rev. 1) [Automated Secure Configuration Guidance from the macOS Security Compliance Project (mSCP)](https://csrc.nist.gov/pubs/sp/800/219/r1/final). NIST Special Publication 800-219 is the official guidance from for automated secure configuration for macOS.
12+
13+
Apple acknowledges the macOS Security Compliance Project with information on their [Platform Certifications](https://support.apple.com/guide/certifications/macos-security-compliance-project-apc322685bb2/web) page.
14+
15+
This project can be used as a resource to easily create customized security baselines of technical security controls by leveraging a library of atomic actions which are mapped to the compliance requirements defined in NIST SP 800-53 (Rev. 5). It can also be used to develop customized guidance to meet the particular cybersecurity needs of any organization.
16+
17+
To learn more about the project, please see the [wiki](https://github.com/usnistgov/macos_security/wiki).
18+
19+
If you are interested in supporting the development of the project, refer to the [contributor guidance](CONTRIBUTING.md) for more information.
20+
21+
## Usage
22+
23+
Civilian agencies are to use the National Checklist Program as required by [NIST 800-70](https://csrc.nist.gov/publications/detail/sp/800-70/rev-4/final).
24+
25+
> [!NOTE]
26+
> Part 39 of the Federal Acquisition Regulations, section 39.101 paragraph (c) states, “In acquiring information technology, agencies shall include the appropriate information technology security policies and requirements, including use of common security configurations available from the National Institute of Standards and Technology’s website at https://checklists.nist.gov. Agency contracting officers should consult with the requiring official to ensure the appropriate standards are incorporated.”
27+
28+
## Authors
29+
30+
31+
|||
32+
|----|----|
33+
|Bob Gendler|NIST|
34+
|Allen Golbig|Jamf
35+
|Dan Brodjieski|NASA
36+
|John Mahlman IV|Leidos
37+
|Aaron Kegerreis|DISA
38+
|Henry Stamerjohann|Zentral Pro Services GmbH
39+
|Marco A Piñeryo II|State Department
40+
|Jason Blake|NIST
41+
|Blair Heiserman|NIST
42+
|Joshua Glemza|NASA
43+
|Elyse Anderson|NASA
44+
|Gary Gapinski|NASA
45+
46+
## Changelog
47+
48+
Refer to the [CHANGELOG](CHANGELOG.md) for a complete list of changes.
49+
50+
## NIST Disclaimer
51+
52+
Any identification of commercial or open-source software in this document is done so purely in order to specify the methodology adequately. Such identification is not intended to imply recommendation or endorsement by the National Institute of Standards and Technology, nor is it intended to imply that the software identified are necessarily the best available for the purpose.

0 commit comments

Comments
 (0)