macos-secure-profiles
macOS security checks
A collection of scripts to validate and configure macOS system security profiles based on STIG standards.
macOS Security Profiles based off of STIG Developed by Apple and DISA for the DOD
9 stars
2 watching
1 forks
Language: Shell
last commit: about 2 years ago macossecure-bootstig-compliant
Related projects:
| Repository | Description | Stars |
|---|---|---|
| | Provides automated security guidance and configuration settings for macOS systems. | 1,823 |
| | An app that checks and reminds users to perform common security tasks on their Macs to prevent typical security issues. | 328 |
| | Automated vulnerability scanning and management tool for macOS applications. | 25 |
| | A security scanner for OSX applications that detects potential vulnerabilities in URL scheme hijack, bundle ID hijack, and keychain hijack. | 41 |
| | Automates the configuration of macOS security settings from the terminal | 1,105 |
| | A tool for coordinating security scanning of software projects | 25 |
| | An application serving as the user interface and database management system for a platform analyzing Android app security vulnerabilities. | 75 |
| | A comprehensive security solution for macOS that combines firewalling, proxying, and antivirus scanning to protect against trackers, malware, and other online threats. | 424 |
| | Detects misconfigurations and vulnerabilities in software supply chains during build pipelines. | 239 |
| | A tool to analyze and monitor Docker images and containers for security threats | 1,164 |
| | A collection of best practices and guidelines for securing iOS applications | 1,391 |
| | A tool that provides secure exam browsing and verification for macOS and iOS devices | 101 |
| | A set of automated security checks for AWS services written in Python to identify potential vulnerabilities and configuration issues. | 36 |
| | An extension for Burp Suite that helps discover Subject Alt Names in SSL certificates | 3 |
| | Generates Seccomp profiles to reduce Linux kernel vulnerabilities in containers | 62 |