diff --git a/ee/cis/macos-13/cis-policy-queries.yml b/ee/cis/macos-13/cis-policy-queries.yml index 2e290c21b2..49ed168a8f 100644 --- a/ee/cis/macos-13/cis-policy-queries.yml +++ b/ee/cis/macos-13/cis-policy-queries.yml @@ -1845,6 +1845,35 @@ spec: --- apiVersion: v1 kind: policy +spec: + name: CIS - Ensure Automatic Opening of Safe Files in Safari Is Disabled (MDM Required) + platforms: macOS + platform: darwin + description: | + Safari will automatically run or execute what it considers safe files. This can include + installers and other files that execute on the operating system. Safari evaluates file safety by + using a list of filetypes maintained by Apple. The list of files include text, image, video and + archive formats that would be run in the context of the OS rather than the browser. + Hackers have taken advantage of this setting via drive-by attacks. These attacks occur when a + user visits a legitimate website that has been corrupted. The user unknowingly downloads a + malicious file either by closing an infected pop-up or hovering over a malicious banner. An + attacker can create a malicious file that will fall within Safari's safe file list that will + download and execute without user input. + resolution: | + Payload Method: + Ask your administrator to deploy a profile which disables AutoOpenSafeDownloads in Safari + query: | + SELECT 1 FROM managed_policies WHERE + domain = 'com.apple.Safari' AND + name = 'AutoOpenSafeDownloads' AND + value = '0' + LIMIT 1; + purpose: Informational + tags: compliance, CIS, CIS_Level1, CIS6.3.1 + contributors: artemist-work +--- +apiVersion: v1 +kind: policy spec: name: CIS - Ensure Advertising Privacy Protection in Safari Is Enabled (FDA Required) platforms: macOS diff --git a/ee/cis/macos-13/test/profiles/6.3.1.mobileconfig b/ee/cis/macos-13/test/profiles/6.3.1.mobileconfig new file mode 100644 index 0000000000..10a6bdba7b --- /dev/null +++ b/ee/cis/macos-13/test/profiles/6.3.1.mobileconfig @@ -0,0 +1,37 @@ + + + + + PayloadContent + + + PayloadDisplayName + test + PayloadType + com.apple.Safari + PayloadIdentifier + com.fleetdm.cis-6.3.1.check + PayloadUUID + 3CAAC721-D492-45AC-95E4-8ECBF81EA21E + AutoOpenSafeDownloads + + + + PayloadDescription + test + PayloadDisplayName + Ensure Automatic Opening of Safe Files in Safari Is Disabled + PayloadIdentifier + com.fleetdm.cis-6.3.1 + PayloadRemovalDisallowed + + PayloadScope + System + PayloadType + Configuration + PayloadUUID + 2556F162-9AE5-4163-92C1-F89A2847C80E + PayloadVersion + 1 + +