Full Metal Mac FullMetalMac.com
Compliance intermediate CIS benchmarks hardening compliance

CIS Benchmarks for macOS

Implementing CIS Benchmarks on your Mac fleet — key settings, automated assessment, and deployment via MDM

Published: Feb 14, 2026 10 min read

The CIS (Center for Internet Security) Benchmarks for macOS are detailed, consensus-driven configuration guides that define exactly how a Mac should be hardened for enterprise use. Where the CIS Controls describe what security priorities to address, the Benchmarks specify how to configure each setting on a specific platform. For Mac administrators, the CIS macOS Benchmark is one of the most practical compliance tools available.

What Are CIS Benchmarks?

CIS Benchmarks are configuration baselines developed by a global community of security practitioners, vendors, and subject matter experts. They exist for operating systems, cloud platforms, databases, network devices, and more. The macOS Benchmark covers hundreds of individual settings organized into categories like system preferences, network configuration, logging, and access control.

Each recommendation includes:

  • A description of the setting and why it matters
  • The audit procedure (how to check the current state)
  • The remediation procedure (how to apply the setting)
  • The CIS Controls mapping (which strategic control this satisfies)

Benchmarks are updated with each major macOS release. Always use the version that matches your fleet’s OS.

Level 1 vs. Level 2 Profiles

The Benchmark defines two hardening levels:

ProfileIntended ForImpact
Level 1Every Mac in the fleetMinimal impact on usability; practical defaults that should not break standard workflows
Level 2High-security environmentsMay restrict functionality; intended for devices handling sensitive data or operating in regulated environments

Tip: Start with Level 1 across your entire fleet. Apply Level 2 selectively to devices in high-risk roles (finance, executive, engineering with source code access) after testing the impact on user workflows.

Key macOS Benchmark Settings

The following table highlights the most impactful settings from the CIS macOS Benchmark. These cover the areas most commonly required for compliance audits.

System Updates and Gatekeeper

SettingRecommendationCheck Command
Automatic software updatesEnable all auto-update optionsdefaults read /Library/Preferences/com.apple.SoftwareUpdate AutomaticCheckEnabled
Gatekeeper enabledMust be activespctl --status
Allow apps from App Store and identified developersRestrict to signed softwarespctl --status --verbose

Encryption and Firewall

SettingRecommendationCheck Command
FileVault enabledRequired on all devicesfdesetup status
macOS Firewall enabledMust be active/usr/libexec/ApplicationFirewall/socketfilterfw --getglobalstate
Firewall stealth modeEnable (Level 2)/usr/libexec/ApplicationFirewall/socketfilterfw --getstealthmode

Screen Lock and Password Policy

SettingRecommendationCheck Command
Screen saver timeout20 minutes or lessdefaults -currentHost read com.apple.screensaver idleTime
Require password after sleep/screensaverImmediately or within 5 secondssysadminctl -screenLock status 2>&1
Password minimum length15 characters (Level 2: 20)Check via configuration profile
Password historyRemember at least 15 passwordsCheck via configuration profile

Remote Access and Sharing

SettingRecommendationCheck Command
Remote Login (SSH) disabledDisable unless requiredsudo systemsetup -getremotelogin
Screen Sharing disabledDisable unless requiredsudo launchctl list com.apple.screensharing 2>&1
Bluetooth Sharing disabledDisableCheck in System Settings or via profile
AirDrop restrictedDisable or restrict to Contacts Onlydefaults read com.apple.NetworkBrowser DisableAirDrop
Content Caching disabledDisable on endpointssudo AssetCacheManagerUtil status 2>&1

Logging and Auditing

SettingRecommendationCheck Command
Security auditing enabledRequiredsudo launchctl list com.apple.auditd
Firewall logging enabledRequired/usr/libexec/ApplicationFirewall/socketfilterfw --getloggingmode
Install.log retention365 daysgrep -i "ttl" /etc/asl/com.apple.install

Automating Assessment with CIS-CAT Pro

Manually checking hundreds of settings is not scalable. CIS offers CIS-CAT Pro, an automated assessment tool that scans a Mac against the Benchmark and produces a compliance report.

How CIS-CAT Pro Works

  1. Download CIS-CAT Pro from the CIS WorkBench (requires a CIS SecureSuite membership)
  2. Run the assessor against the macOS Benchmark
  3. Review the HTML or XML report showing pass/fail for each recommendation
  4. Export results to your GRC (Governance, Risk, and Compliance) platform
# Example: Run CIS-CAT Pro assessment from the command line
sudo ./Assessor-CLI.sh -b benchmarks/CIS_Apple_macOS_Benchmark_v*.xml \
  -p "Level 1" \
  -r /tmp/cis_report

Note: CIS-CAT Pro requires a CIS SecureSuite membership (paid). The Benchmark document itself is available for free download with a CIS WorkBench account.

Deploying via MDM Configuration Profiles

The most effective way to enforce CIS Benchmark settings across your fleet is through MDM configuration profiles. Most Benchmark recommendations map directly to MDM payload keys.

Mapping Benchmarks to MDM Payloads

Benchmark CategoryMDM Payload
Password policycom.apple.mobiledevice.passwordpolicy
FileVault enforcementcom.apple.MCX.FileVault2
Firewall settingscom.apple.security.firewall
Screen lock / screensavercom.apple.screensaver
Software update policycom.apple.SoftwareUpdate
AirDrop restrictioncom.apple.applicationaccess (restrictions payload)
Remote Login (SSH)Managed via com.apple.MCX or script
Sharing servicescom.apple.MCX preferences

Example: Deploying Key Settings via Jamf Pro

  1. FileVault – Use the Disk Encryption configuration profile payload to enforce FileVault and escrow recovery keys to Jamf Pro.
  2. Firewall – Deploy a Security & Privacy payload enabling the application firewall.
  3. Password policy – Deploy a Passcode payload setting minimum length, complexity, and history requirements.
  4. Restrictions – Deploy a Restrictions payload to disable AirDrop, Bluetooth Sharing, and other sharing services.
# After deploying profiles, verify on a target Mac:
profiles list -verbose | grep -A 5 "com.apple.security.firewall"

Continuous Compliance Monitoring

Deploying profiles once is not enough. Devices drift out of compliance when users modify settings, profiles fail to install, or new Macs are enrolled without the correct profile scope.

Strategies for continuous monitoring:

  • Jamf Pro Smart Groups – Create Smart Groups based on compliance criteria (e.g., FileVault enabled, firewall active, OS version current). Devices that fall out of compliance automatically enter the group and can trigger remediation policies.
  • osquery scheduled queries – Write queries that check for each critical Benchmark setting and report results to your logging platform.
  • CIS-CAT Pro scheduled scans – Run assessments on a recurring schedule (weekly or monthly) and track compliance scores over time.
  • NIST mSCP compliance scripts – The NIST macOS Security Compliance Project can generate compliance check scripts that map to CIS Benchmarks.

Where to Download the Benchmark

  1. Create a free account at CIS WorkBench
  2. Navigate to the Benchmarks section and search for “Apple macOS”
  3. Download the PDF for your target macOS version
  4. Optionally, subscribe to CIS SecureSuite for access to CIS-CAT Pro and machine-readable Benchmark content

Next Steps

Related Articles