Lesson 5: CIS Benchmarks Flashcards

(19 cards)

1
Q

What are CIS Benchmarks?

A

Consensus-based, globally accepted, and free-to-obtain security guidelines for all major operating systems and networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CIS Benchmarks are made up of security recommendations called?

A

Profiles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the two types of profiles in the macOS CIS Benchmark?

A

Level 1 and Level 2 profiles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Level 1 profile in the macOS Benchmark?

A

A practical security recommendation with little to no impact on the user’s experience.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Level 2 profile in the macOS Benchmark?

A

A more restrictive security recommendation that may impact the user experience on a Mac.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are CIS Benchmarks and what are they used for?

A

CIS Benchmarks are a set of consensus-based security best practices developed by the Center for Internet Security (CIS). They are used to secure operating systems, software, and networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is required before downloading CIS Benchmarks?

A

Account registration on the CIS website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What information does each CIS profile contain?

A

Affected macOS area, rationale and impact statements, audit steps, and remediation steps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a rationale statement in a CIS Benchmark?

A

A justification for implementing the profile.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an impact statement in a CIS Benchmark?

A

Details the potential consequences of not implementing the profile.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are audit steps in a CIS Benchmark?

A

Instructions for how administrators can check the status of the relevant macOS feature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are remediation steps in a CIS Benchmark?

A

Instructions for how to change the setting in macOS to ensure compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does Jamf Protect use the macOS Benchmark?

A

It uses the benchmark to generate insights about enrolled computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are insights in Jamf Protect?

A

Status updates collected and reported on for enrolled computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What do insights display in Jamf Protect?

A

The number of compliant and noncompliant enrolled computers in real time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

True/False: Insights both report and enforce security recommendations.

A

False. Insights only report compliance; enforcement requires a solution like Jamf Pro.

17
Q

To enforce or restrict settings in macOS, what must be used alongside Jamf Protect?

A

A management solution like Jamf Pro.

18
Q

What is the difference between a Level 1 and Level 2 profile within the macOS Benchmark?

A

Level 1 has little to no user impact; Level 2 is more secure but may impact user experience.

19
Q

Within the macOS Benchmark, what is an impact statement?

A

It details the consequences of not implementing the associated recommendation for managed Macs.