Closed 72nomada closed 1 year ago
Target version | Related issue | Related PR |
---|---|---|
4.4.x | #3850 | https://github.com/wazuh/wazuh/pull/16027 |
Check Id and Name | Status | Extra |
---|---|---|
2.3.4 Time Machine | ||
2.3.4.1 Ensure Backup Automatically is Enabled If Time Machine Is Enabled (Automated) | ||
2.3.4.2 Ensure Time Machine Volumes Are Encrypted If Time Machine Is Enabled (Automated) | ||
2.4 Control Center | ||
2.4.1 Ensure Show Wi-Fi status in Menu Bar Is Enabled (Automated) | ||
2.4.2 Ensure Show Bluetooth Status in Menu Bar Is Enabled (Automated) | ||
2.5 Siri & Spotlight | ||
2.5.1 Audit Siri Settings (Manual) | ||
2.6 Privacy & Security | ||
2.6.1 Location Services | ||
2.6.1.1 Ensure Location Services Is Enabled (Automated) | ||
2.6.1.2 Ensure Location Services Is in the Menu Bar (Automated) | ||
2.6.1.3 Audit Location Services Access (Manual) | ||
2.6.2 Ensure Sending Diagnostic and Usage Data to Apple Is Disabled (Automated) | ||
2.6.3 Ensure Limit Ad Tracking Is Enabled (Automated) | ||
2.6.4 Ensure Gatekeeper Is Enabled (Automated) | ||
2.6.5 Ensure FileVault Is Enabled (Automated) | ||
2.6.6 Audit Lockdown Mode (Manual) | ||
2.6.7 Ensure an Administrator Password Is Required to Access System-Wide Preferences (Manual) | ||
2.7 Desktop & Dock | ||
2.7.1 Ensure Screen Saver Corners Are Secure (Automated) | ||
2.8 Displays | ||
2.8.1 Audit Universal Control Settings (Manual) | ||
2.9 Battery (Energy Saver) | ||
2.9.1 Ensure Power Nap Is Disabled for Intel Macs (Automated) | ||
2.9.2 Ensure Wake for Network Access Is Disabled (Automated) | ||
2.9.3 Ensure the OS is not Activate When Resuming from Sleep (Automated) | ||
2.10 Lock Screen | ||
2.10.1 Ensure an Inactivity Interval of 20 Minutes Or Less for the Screen Saver Is Enabled (Automated) | ||
2.10.2 Ensure a Password is Required to Wake the Computer From Sleep or Screen Saver Is Enabled (Automated) | ||
2.10.3 Ensure a Custom Message for the Login Screen Is Enabled (Automated) | ||
2.10.4 Ensure Login Window Displays as Name and Password Is Enabled (Automated) | ||
2.10.5 Ensure Show Password Hints Is Disabled (Automated) | ||
2.11 Touch ID & Password (Login Password) | ||
2.11.1 Ensure Users' Accounts Do Not Have a Password Hint (Automated) | ||
2.11.2 Audit Touch ID and Wallet & Apple Pay Settings (Manual) | ||
2.12 Users & Groups | ||
2.12.1 Ensure Guest Account Is Disabled (Automated) | ||
2.12.2 Ensure Guest Access to Shared Folders Is Disabled (Automated) | ||
2.12.3 Ensure Automatic Login Is Disabled (Automated) | ||
2.13 Passwords | ||
2.13.1 Audit Passwords System Preference Setting (Manual) | ||
2.14 Notifications | ||
2.14.1 Audit Notification & Focus Settings (Manual) | ||
OS | OS version | Deployment | Image/AMI | Notes |
---|---|---|---|---|
macOS | Ventura | Local | ||
ubuntu | 20 | Vagrant | - |
wazuh-manager |
wazuh-agent |
---|---|
4.4.1 | 4.4.1 |
Note macOS Ventura sca policy will be included manually in the agent. The development package will be used for the final validation
macOS policy fulfills correctly the CIS benchmark. However, it was detected some unexpected behavior in macOS Ventura commands output gathering, in which some lines are ignored. Check https://github.com/wazuh/wazuh/issues/16760 for more information
Some of the changes implemented in this review:
Tester | PR commit |
---|---|
@Rebits | https://github.com/wazuh/wazuh/pull/16027/commits/eaaa5b84aaa125a7ed6ffe873cc1425ad921c564 |
The description, impact, rationale, and remediation fields will be checked manually in case of a false positive in the automatic report. However, compliance will be checked automatically.
Command output
``` sh-3.2# osascript -l JavaScript -e "$.NSUserDefaults.alloc.initWithSuiteName('com.apple.TimeMachine').objectForKey('AutoBackup')" sh-3.2# osascript -l JavaScript -e "$.NSUserDefaults.alloc.initWithSuiteName('com.apple.TimeMachine').objectForKey('LastDestinationID')" ```Alert
``` 2023/04/13 11:12:15 sca[3480] wm_sca.c:986 at wm_sca_do_scan(): DEBUG: Beginning evaluation of check id: 30020 'Ensure Backup Automatically is Enabled If Time Machine Is Enabled.' 2023/04/13 11:12:15 sca[3480] wm_sca.c:1241 at wm_sca_do_scan(): DEBUG: Result for check id: 30020 'Ensure Backup Automatically is Enabled If Time Machine Is Enabled.' -> 1 2023/04/13 11:12:16 sca[3480] wm_sca.c:2805 at wm_sca_hash_integrity(): DEBUG: ID: 30020; Result: 'passed' ```
Command output
``` sh-3.2# sh -c "defaults read /Library/Preferences/com.apple.TimeMachine.plist | grep -c NotEncrypted" ```Alert
``` 2023/04/13 11:16:11 sca[3607] wm_sca.c:986 at wm_sca_do_scan(): DEBUG: Beginning evaluation of check id: 30021 'Ensure Time Machine Volumes Are Encrypted If Time Machine Is Enabled.' 2023/04/13 11:16:11 sca[3607] wm_sca.c:1241 at wm_sca_do_scan(): DEBUG: Result for check id: 30021 'Ensure Time Machine Volumes Are Encrypted If Time Machine Is Enabled.' -> 1 2023/04/13 11:16:11 sca[3607] wm_sca.c:2805 at wm_sca_hash_integrity(): DEBUG: ID: 30021; Result: 'passed' ```
Command output
``` sh-3.2# sh -c "launchctl list | grep -c com.apple.locationd" 1 sh-3.2# sudo -u _locationd /usr/bin/osascript -l JavaScript -e "$.NSUserDefaults.alloc.initWithSuiteName('com.apple.locationd').objectForKey('LocationServicesEnabled')" 1 ```Alert
``` sh-3.2# pkill modulesd; /Library/Ossec/bin/wazuh-modulesd -fdd 2>&1 | grep 'sca\[' | grep 30022 2023/04/13 11:22:18 sca[3782] wm_sca.c:986 at wm_sca_do_scan(): DEBUG: Beginning evaluation of check id: 30022 'Ensure Location Services Is Enabled.' 2023/04/13 11:22:18 sca[3782] wm_sca.c:1241 at wm_sca_do_scan(): DEBUG: Result for check id: 30022 'Ensure Location Services Is Enabled.' -> 1 2023/04/13 11:22:18 sca[3782] wm_sca.c:2805 at wm_sca_hash_integrity(): DEBUG: ID: 30022; Result: 'passed' ```
Command output
``` sh-3.2# defaults read /Library/Preferences/com.apple.locationmenu.plist ShowSystemServices 2023-04-13 11:37:51.898 defaults[4151:40826] The domain/default pair of (/Library/Preferences/com.apple.locationmenu.plist, ShowSystemServices) does not exist sh-3.2# ```Alert
``` 2023/04/13 11:43:42 sca[4287] wm_sca.c:986 at wm_sca_do_scan(): DEBUG: Beginning evaluation of check id: 30023 'Ensure Location Services Is in the Menu Bar.' 2023/04/13 11:43:42 sca[4287] wm_sca.c:1241 at wm_sca_do_scan(): DEBUG: Result for check id: 30023 'Ensure Location Services Is in the Menu Bar.' -> 0 2023/04/13 11:43:43 sca[4287] wm_sca.c:2805 at wm_sca_hash_integrity(): DEBUG: ID: 30023; Result: 'failed' ```
Command output
``` sh-3.2# /usr/bin/sudo /usr/sbin/spctl --status assessments enabled ```Alert
``` 2023/04/13 11:48:01 sca[4420] wm_sca.c:986 at wm_sca_do_scan(): DEBUG: Beginning evaluation of check id: 30024 'Ensure Gatekeeper Is Enabled.' 2023/04/13 11:48:01 sca[4420] wm_sca.c:1241 at wm_sca_do_scan(): DEBUG: Result for check id: 30024 'Ensure Gatekeeper Is Enabled.' -> 1 2023/04/13 11:48:01 sca[4420] wm_sca.c:2805 at wm_sca_hash_integrity(): DEBUG: ID: 30024; Result: 'passed' ```
Command output
``` sh-3.2# fdesetup status FileVault is Off. sh-3.2# osascript -l JavaScript -e "$.NSUserDefaults.alloc.initWithSuiteName('com.apple.MCX').objectForKey('dontAllowFDEDisable') " ```Alert
``` 2023/04/13 11:52:43 sca[4566] wm_sca.c:986 at wm_sca_do_scan(): DEBUG: Beginning evaluation of check id: 30025 'Ensure FileVault Is Enabled.' 2023/04/13 11:52:43 sca[4566] wm_sca.c:1241 at wm_sca_do_scan(): DEBUG: Result for check id: 30025 'Ensure FileVault Is Enabled.' -> 0 2023/04/13 11:52:43 sca[4566] wm_sca.c:2805 at wm_sca_hash_integrity(): DEBUG: ID: 30025; Result: 'failed' ```
Command output
``` sh-3.2# sh -c "pmset -g custom | grep powernap | grep -c 1" 2 ```Alert
``` sh-3.2# pkill modulesd; /Library/Ossec/bin/wazuh-modulesd -fdd 2>&1 | grep 'sca\[' | grep 30026 2023/04/13 11:59:25 sca[4767] wm_sca.c:986 at wm_sca_do_scan(): DEBUG: Beginning evaluation of check id: 30026 'Ensure Power Nap Is Disabled for Intel Macs.' 2023/04/13 11:59:25 sca[4767] wm_sca.c:1241 at wm_sca_do_scan(): DEBUG: Result for check id: 30026 'Ensure Power Nap Is Disabled for Intel Macs.' -> 1 2023/04/13 11:59:26 sca[4767] wm_sca.c:2805 at wm_sca_hash_integrity(): DEBUG: ID: 30026; Result: 'passed' ```
Command output
``` sh-3.2# sh -c "pmset -g | grep -e womp" womp 0 sh-3.2# sh -c "profiles -P -o stdout | grep 'Wake On LAN'" sh-3.2# sh -c "profiles -P -o stdout | grep 'Wake On Modem Ring'" ```Alert
``` 2023/04/13 13:08:35 sca[6664] wm_sca.c:986 at wm_sca_do_scan(): DEBUG: Beginning evaluation of check id: 30027 'Ensure Wake for Network Access Is Disabled.' 2023/04/13 13:08:35 sca[6664] wm_sca.c:1241 at wm_sca_do_scan(): DEBUG: Result for check id: 30027 'Ensure Wake for Network Access Is Disabled.' -> 1 2023/04/13 13:08:35 sca[6664] wm_sca.c:2805 at wm_sca_hash_integrity(): DEBUG: ID: 30027; Result: 'passed' ```
Command output
``` sh-3.2# osascript -l JavaScript -e "$.NSUserDefaults.alloc.initWithSuiteName('com.apple.loginwindow').objectForKey('LoginwindowText')" sh-3.2# ```Alert
``` 2023/04/13 13:12:57 sca[6800] wm_sca.c:986 at wm_sca_do_scan(): DEBUG: Beginning evaluation of check id: 30028 'Ensure a Custom Message for the Login Screen Is Enabled.' 2023/04/13 13:12:57 sca[6800] wm_sca.c:1241 at wm_sca_do_scan(): DEBUG: Result for check id: 30028 'Ensure a Custom Message for the Login Screen Is Enabled.' -> 0 2023/04/13 13:12:57 sca[6800] wm_sca.c:2805 at wm_sca_hash_integrity(): DEBUG: ID: 30028; Result: 'failed' ```
Command output
``` sh-3.2# osascript -l JavaScript -e "$.NSUserDefaults.alloc.initWithSuiteName('com.apple.loginwindow').objectForKey('SHOWFULLNAME')" ```Alert
``` sh-3.2# pkill modulesd; /Library/Ossec/bin/wazuh-modulesd -fdd 2>&1 | grep 'sca\[' | grep 30029 2023/04/13 13:30:45 sca[7285] wm_sca.c:986 at wm_sca_do_scan(): DEBUG: Beginning evaluation of check id: 30029 'Ensure Login Window Displays as Name and Password Is Enabled.' 2023/04/13 13:30:45 sca[7285] wm_sca.c:1241 at wm_sca_do_scan(): DEBUG: Result for check id: 30029 'Ensure Login Window Displays as Name and Password Is Enabled.' -> 0 2023/04/13 13:30:46 sca[7285] wm_sca.c:2805 at wm_sca_hash_integrity(): DEBUG: ID: 30029; Result: 'failed' ```
Command output
``` sh-3.2# osascript -l JavaScript -e "$.NSUserDefaults.alloc.initWithSuiteName('com.apple.loginwindow').objectForKey('RetriesUntilHint')" ```Alert
``` sh-3.2# pkill modulesd; /Library/Ossec/bin/wazuh-modulesd -fdd 2>&1 | grep 'sca\[' | grep 30030 2023/04/13 13:32:01 sca[7411] wm_sca.c:986 at wm_sca_do_scan(): DEBUG: Beginning evaluation of check id: 30030 'Ensure Show Password Hints Is Disabled.' 2023/04/13 13:32:01 sca[7411] wm_sca.c:1241 at wm_sca_do_scan(): DEBUG: Result for check id: 30030 'Ensure Show Password Hints Is Disabled.' -> 0 2023/04/13 13:32:01 sca[7411] wm_sca.c:2805 at wm_sca_hash_integrity(): DEBUG: ID: 30030; Result: 'failed' 2023/04/13 13:32:06 sca[7411] wm_sca.c:256 at wm_sca_send_alert(): DEBUG: Sending event: {"type":"check","id":2124972720,"policy":"SCA policy for Apple macOS 13.x Ventura based on CIS benchmark for Apple macOS 13.x Ventura. 11-14-2022","policy_id":"cis_macOS_13","check":{"id":30030,"title":"Ensure Show Password Hints Is Disabled.","description":"Password hints are user-created text displayed when an incorrect password is used for an account.","rationale":"Password hints make it easier for unauthorized persons to gain access to systems by displaying information provided by the user to assist in remembering the password. This info could include the password itself or other information that might be readily discerned with basic knowledge of the end user.","remediation":"Graphical Method: Perform the following steps to disable password hints from being shown: 1. Open System Settings 2. Select Lock Screen 3. Set 'Show password hints' to disabled Terminal Method: Run the following command to disable password hints: $ /usr/bin/sudo /usr/bin/defaults write /Library/Preferences/com.apple.loginwindow RetriesUntilHint -int 0 ; Profile Method: Create or edit a configuration profile with the following information: 1. The PayloadType string is com.apple.loginwindow 2. The key to include is RetriesUntilHint 3. The key must be set to0 .","compliance":{"cis":"2.10.5","cis_csc_v8":"4.1","cis_csc_v7":"5.1","cmmc_v2.0":"AC.1.002,CM.2.061,SC.3.180","cmmc_v2.0":"AC.L1-3.1.1,AC.L1-3.1.2,CM.L2-3.4.1,CM.L2-3.4.6,CM.L2-3.4.2,CM.L2-3.4.7","pci_dss_3.2.1":"2.2,11.5","pci_dss_4.0":"1.1.1,1.2.1,1.2.6,1.5.1,1.2.7,2.1.1,2.2.1","iso_27001-2013":"A.8.1.3,A.14.2.5","mitre_techniques":"T1110,T1003,T1081,T1097,T1178,T1072,T1067,T1495,T1019,T1177,T1485,T1486,T1491,T1488,T1487,T1490,T1146,T1148,T1015,T1133,T1200,T1076,T1051,T1176,T1501,T1087,T1098,T1139,T1197,T1092,T1136,T1011,T1147,T1130,T1174,T1053,T1166,T1206,T1503,T1214,T1187,T1208,T1142,T1075,T1201,T1145,T1184,T1537,T1078,T1077,T1134,T1017,T1088,T1175,T1190,T1210,T1525,T1215,T1086,T1055,T1505,T1035,T1218,T1169,T1100,T1047,T1084,T1028,T1156,T1196,T1530,T1089,T1073,T1157,T1054,T1070,T1037,T1036,T1096,T1034,T1150,T1504,T1494,T1489,T1198,T1165,T1492,T1080,T1209,T1112,T1058,T1173,T1137,T1539,T1535,T1506,T1138,T1044,T1199","nist_sp_800-53":"AU-2,CM-1,CM-2,CM-6,CM-7,IA-5,IA-6,SC-20,SC-21,CM-7(1),CM-9,SA-10","soc_2":"CC7.1,CC8.1"},"rules":["c:osascript -l JavaScript -e \"$.NSUserDefaults.alloc.initWithSuiteName('com.apple.loginwindow').objectForKey('RetriesUntilHint')\" -> r:^0$"],"condition":"any","command":"osascript -l JavaScript -e \"$.NSUserDefaults.alloc.initWithSuiteName('com.apple.loginwindow').objectForKey('RetriesUntilHint')\"","result":"failed"}} ```
Command output
``` sh-3.2# osascript -l JavaScript -e "$.NSUserDefaults.alloc.initWithSuiteName('com.apple.MCX').objectForKey('DisableGuestAccount') > " sh-3.2# osascript -l JavaScript -e "$.NSUserDefaults.alloc.initWithSuiteName('com.apple.loginwindow').objectForKey('GuestEnabled') > " 0 sh-3.2# ```Alert
``` 2023/04/13 13:43:18 sca[7793] wm_sca.c:986 at wm_sca_do_scan(): DEBUG: Beginning evaluation of check id: 30031 'Ensure Guest Account Is Disabled.' 2023/04/13 13:43:18 sca[7793] wm_sca.c:1241 at wm_sca_do_scan(): DEBUG: Result for check id: 30031 'Ensure Guest Account Is Disabled.' -> 1 ```
Command output
``` sh-3.2# sysadminctl -smbGuestAccess status 2023-04-13 13:45:26.102 sysadminctl[7891:93741] SMB guest access disabled. ```Alert
``` 2023/04/13 13:45:54 sca[7903] wm_sca.c:986 at wm_sca_do_scan(): DEBUG: Beginning evaluation of check id: 30032 'Ensure Guest Access to Shared Folders Is Disabled.' 2023/04/13 13:45:54 sca[7903] wm_sca.c:1241 at wm_sca_do_scan(): DEBUG: Result for check id: 30032 'Ensure Guest Access to Shared Folders Is Disabled.' -> 1 ```
Command output
``` sh-3.2# osascript -l JavaScript -e "$.NSUserDefaults.alloc.initWithSuiteName('com.apple.loginwindow').objectForKey('com.apple.login.mcx.DisableAutoLoginClient')" sh-3.2# osascript -l JavaScript -e "$.NSUserDefaults.alloc.initWithSuiteName('com.apple.loginwindow').objectForKey('autoLoginUser')" ```Alert
``` 2023/04/13 13:59:34 sca[8242] wm_sca.c:986 at wm_sca_do_scan(): DEBUG: Beginning evaluation of check id: 30033 'Ensure Automatic Login Is Disabled.' 2023/04/13 13:59:34 sca[8242] wm_sca.c:1241 at wm_sca_do_scan(): DEBUG: Result for check id: 30033 'Ensure Automatic Login Is Disabled.' -> 1 ```
https://github.com/wazuh/wazuh-qa/issues/3852#issuecomment-1506527955
2.6.1.2 π΄ - The rule is fine, won't change 2.6.5 π΄ - Solved 2.6.7 π΄ - Solved 2.9.1 π΄ - Solved 2.10.1 π΄ - we are not implementing this because the check requires user profiles 2.10.2 π΄ - Solved 2.10.5 π΄ - Solved 2.11.1 π΄ - Solved
https://github.com/wazuh/wazuh/pull/16027/commits/95067663050c453c7a813d005158f02fc29a854c
Tester | PR commit |
---|---|
@Rebits | https://github.com/wazuh/wazuh/pull/16027/commits/03564c1b7a9b6c26ea96732b5ba58c3154623d18 |
Command output
``` sh-3.2# sh-3.2# security authorizationdb read system.preferences | grep -A1 sharedshared YES (0) sh-3.2# ``` Alert
``` 2023/04/18 15:03:27 sca[21116] wm_sca.c:1909 at wm_sca_pattern_matches(): DEBUG: Testing minterm (/System/Library/CoreServices/RemoteManagement/ARDAgent.app/Contents/MacOS/ARDAgent)(grep 31042) -> 0 2023/04/18 15:03:27 sca[21116] wm_sca.c:1912 at wm_sca_pattern_matches(): DEBUG: Pattern test result: (/System/Library/CoreServices/RemoteManagement/ARDAgent.app/Contents/MacOS/ARDAgent)(grep 31042) -> 0 2023/04/18 15:03:27 sca[21116] wm_sca.c:1000 at wm_sca_do_scan(): DEBUG: Beginning evaluation of check id: 31042 'Ensure an Administrator Password Is Required to Access System-Wide Preferences.' 2023/04/18 15:03:27 sca[21116] wm_sca.c:1255 at wm_sca_do_scan(): DEBUG: Result for check id: 31042 'Ensure an Administrator Password Is Required to Access System-Wide Preferences.' -> 0 ```
Command output
``` sh-3.2# osascript -l JavaScript -e "$.NSUserDefaults.alloc.initWithSuiteName('com.apple.screensaver').objectForKey('askForPassword')" sh-3.2# osascript -l JavaScript -e "$.NSUserDefaults.alloc.initWithSuiteName('com.apple.screensaver').objectForKey('askForPasswordDelay')" ```Alert
``` 2023/04/18 14:31:00 sca[18131] wm_sca.c:1909 at wm_sca_pattern_matches(): DEBUG: Testing minterm (/System/Library/CoreServices/RemoteManagement/ARDAgent.app/Contents/MacOS/ARDAgent)(grep 31049) -> 0 2023/04/18 14:31:00 sca[18131] wm_sca.c:1912 at wm_sca_pattern_matches(): DEBUG: Pattern test result: (/System/Library/CoreServices/RemoteManagement/ARDAgent.app/Contents/MacOS/ARDAgent)(grep 31049) -> 0 2023/04/18 14:31:00 sca[18131] wm_sca.c:1000 at wm_sca_do_scan(): DEBUG: Beginning evaluation of check id: 31049 'Ensure a Password is Required to Wake the Computer From Sleep or Screen Saver Is Enabled.' 2023/04/18 14:31:00 sca[18131] wm_sca.c:1255 at wm_sca_do_scan(): DEBUG: Result for check id: 31049 'Ensure a Password is Required to Wake the Computer From Sleep or Screen Saver Is Enabled.' -> 0 2023/04/18 14:31:01 sca[18131] wm_sca.c:2820 at wm_sca_hash_integrity(): DEBUG: ID: 31049; Result: 'failed' ```
Command output
``` sh-3.2# dscl . -list /Users hint sh-3.2# ```Alert
``` 2023/04/18 14:24:06 sca[16212] wm_sca.c:1909 at wm_sca_pattern_matches(): DEBUG: Testing minterm (/System/Library/CoreServices/RemoteManagement/ARDAgent.app/Contents/MacOS/ARDAgent)(grep 31053) -> 0 2023/04/18 14:24:06 sca[16212] wm_sca.c:1912 at wm_sca_pattern_matches(): DEBUG: Pattern test result: (/System/Library/CoreServices/RemoteManagement/ARDAgent.app/Contents/MacOS/ARDAgent)(grep 31053) -> 0 2023/04/18 14:24:07 sca[16212] wm_sca.c:1000 at wm_sca_do_scan(): DEBUG: Beginning evaluation of check id: 31053 'Ensure Users' Accounts Do Not Have a Password Hint.' 2023/04/18 14:24:07 sca[16212] wm_sca.c:1255 at wm_sca_do_scan(): DEBUG: Result for check id: 31053 'Ensure Users' Accounts Do Not Have a Password Hint.' -> 1 ```
https://github.com/wazuh/wazuh-qa/issues/3852#issuecomment-1513102044
2.6.7 π΄ - won't change 2.10.2 π΄ - Solved
https://github.com/wazuh/wazuh/pull/16027/commits/0933eabc74fe89a053b188f1c5cd3eefd2c63ec7
Tester | PR commit |
---|---|
@Rebits | https://github.com/wazuh/wazuh/commit/0933eabc74fe89a053b188f1c5cd3eefd2c63ec7 |
macOS policy fulfills correctly the CIS benchmark. However, it was detected some unexpected behavior in macOS Ventura commands output gathering, in which some lines are ignored. Check https://github.com/wazuh/wazuh/issues/16760 for more information.