Back
🔒
Apple macOS 14 (Sonoma) Security Checklist
Medium
20 items
·
2 hours
testuser
Published 1 month ago
This checklist summarizes essential security hardening steps for Apple macOS 14 (Sonoma) based on STIG guidance. It’s for system administrators and informed users who want to secure macOS devices in managed or personal environments. Use it to audit settings, enforce policies, and prepare devices for compliance reviews.
Progress
0 / 20
- Install macOS updates — Enable auto-updates and install all available macOS 14 patches and security updates.
- Enable FileVault disk encryption — Turn on full-disk encryption to protect data at rest using System Settings > Privacy & Security.
- Record FileVault recovery key — Save the recovery key to a secure location or institutional escrow before completing setup.
- Verify FileVault encryption status — Confirm encryption completed successfully in System Settings or via diskutil in Terminal.
- Set firmware (EFI) password — Configure an EFI password in Recovery mode to prevent unauthorized boot or disk access.
- Disable automatic login — Require users to enter credentials at login to prevent bypassing account-level controls.
- Require password after sleep/screensaver — Set immediate or short timeout for password requirement on wake to prevent unauthorized access.
- Enable macOS Firewall — Turn on the built-in firewall to block unsolicited incoming network connections.
- Enable Stealth Mode for firewall — Prevent your Mac from responding to probing or ping requests when connected to networks.
- Ensure System Integrity Protection (SIP) is enabled — Verify SIP is active to protect system files and processes from tampering.
- Enable Gatekeeper and restrict app sources — Allow apps from App Store or identified developers only to reduce untrusted software risk.
- Enable XProtect and malware removal updates — Keep built-in malware definitions and removal tools current via automatic updates.
- Disable unnecessary sharing services — Turn off File Sharing, Screen Sharing, Remote Login, and Remote Management if unused.
- Limit Bluetooth and AirDrop discoverability — Set AirDrop to Contacts Only and restrict Bluetooth visibility when not pairing.
- Configure encrypted Time Machine backups — Use an encrypted backup volume and verify backups run regularly and complete successfully.
- Set strong user account passwords and enable MFA where possible — Enforce long passphrases and enable two-factor authentication for Apple ID and accounts.
- Audit and remove unused user accounts — Delete or disable dormant accounts and review admin privileges regularly.
- Review privacy settings for location, camera, mic access — Restrict apps' access to sensitive sensors and data via Privacy & Security settings.
- Enable Find My Mac and Activation Lock — Turn on device tracking and activation lock to help recover or disable lost/stolen Macs.
- Maintain an offline recovery plan — Keep offline copies of installers, recovery keys, and backup verification records securely stored.
Your Stats
🏆
0
Completed
📅
—
Last Done
⏱️
—
Last Time
Completion Rate
Items checked per run
⚡
—
Fastest Run
🔥
0
Streak
🚫
—
Most Skipped Step
🔄
0
Resets
📝 My Notes