DISA Mac STIGs 2025: What Changed and How to Stay Compliant

DISA (Defense Information Systems Agency) publishes Security Technical Implementation Guides (STIGs) that define security configurations for federal systems, including macOS. The 2025 STIG updates bring important changes that affect how government Macs must be configured. Here’s what changed and how to ensure your Mac stays compliant.

Understanding Mac STIGs

What Are STIGs?

Security Technical Implementation Guides are:

  • Configuration standards developed by DISA
  • Required for DoD systems
  • Adopted by many civilian agencies
  • Updated regularly with new security requirements
  • Specific to operating systems, applications, and devices

macOS STIG Structure

The macOS STIG contains:

  • Rules: Specific configuration requirements
  • Severity ratings: CAT I (High), CAT II (Medium), CAT III (Low)
  • Check procedures: How to verify compliance
  • Fix procedures: How to remediate non-compliance
  • Discussion: Rationale for each requirement

Key Changes in 2025 STIGs

macOS Sonoma Requirements

The 2025 STIGs address macOS Sonoma (14.x) with updates including:

  • New system extension security requirements
  • Updated FileVault configuration mandates
  • Enhanced Gatekeeper enforcement
  • Revised password complexity rules
  • Updated audit logging requirements

Authentication Changes

Significant updates to authentication requirements:

  • Strengthened smart card (CAC/PIV) enforcement
  • Updated password expiration policies
  • New requirements for Touch ID restrictions
  • Enhanced screen lock timeout rules
  • Updated session management requirements

Privacy and Security Controls

New and updated controls for:

  • Location Services restrictions
  • Bluetooth configuration requirements
  • Camera and microphone privacy
  • iCloud and cloud service restrictions
  • Sharing service limitations

How STIGs Affect Your Mac

What You’ll Notice

STIG compliance may result in:

  • Password changes required more frequently
  • Stricter password complexity requirements
  • Screen locks after shorter idle periods
  • Some features disabled or restricted
  • CAC required for more operations

Restricted Features

STIG compliance typically restricts:

  • iCloud services and syncing
  • AirDrop file transfers
  • Screen sharing to unauthorized parties
  • Bluetooth device pairing
  • Guest user accounts
  • Automatic login

Compliance Verification

Automated Scanning

Your agency likely uses automated tools to verify STIG compliance:

  • SCAP tools: Security Content Automation Protocol scanners
  • Nessus: Vulnerability and compliance scanning
  • JAMF Compliance: MDM-based STIG enforcement
  • osquery: Endpoint visibility and compliance

Manual Verification

Some STIG rules require manual review:

  • Physical security measures
  • Policy acknowledgments
  • Administrative procedures
  • Documentation requirements

Common STIG Requirements

Password Policy

  • Minimum 15 characters (increased from 14)
  • Mix of uppercase, lowercase, numbers, special characters
  • Password history prevents reuse of last 5 passwords
  • Maximum password age of 60 days
  • Account lockout after failed attempts

Screen Lock

  • Automatic lock after 15 minutes of inactivity
  • Immediate lock available via hot corners or keyboard
  • Password required to wake from sleep
  • Screen saver with password protection

Encryption

  • FileVault must be enabled
  • Recovery keys escrowed with IT
  • Secure boot configuration required
  • Firmware password may be required

Audit Logging

  • Security audit logging enabled
  • Log retention periods specified
  • Centralized log collection
  • Tamper protection for logs

Staying Compliant

Your Responsibilities

  • Don’t attempt to bypass security controls
  • Report issues through proper channels
  • Keep your Mac enrolled in MDM
  • Allow security scans to complete
  • Update when prompted by IT

What IT Handles

  • Pushing STIG-compliant configurations
  • Monitoring compliance status
  • Remediating non-compliant settings
  • Managing exceptions when justified
  • Reporting compliance to security teams

Exception Requests

If a STIG requirement prevents you from doing your job:

  1. Document the specific STIG rule causing issues
  2. Explain the mission impact
  3. Describe what you need to accomplish
  4. Submit a formal exception request through IT
  5. Propose mitigating controls if possible

Exception approval requires security officer review and is granted only when mission need outweighs risk.

Resources for STIG Information

Official Sources

  • DISA STIG Library: public.cyber.mil/stigs/
  • NIST Security Guides: nist.gov/cyberframework
  • Apple Platform Security: support.apple.com/guide/security

Tools and Documentation

  • STIG Viewer application (from DISA)
  • macOS Security Compliance Project (GitHub)
  • Agency-specific STIG implementation guides

Planning for Updates

STIG updates happen regularly:

  • New macOS versions get new STIGs
  • Quarterly STIG updates address new threats
  • Your agency coordinates STIG rollouts
  • Plan for potential disruption during updates

STIG compliance is essential for protecting federal systems and data. While the requirements may sometimes feel restrictive, they represent the security baseline necessary to defend against sophisticated threats targeting government networks. Understanding STIGs helps you work effectively within these important security controls.

David Chen

David Chen

Author & Expert

David Chen is a professional woodworker and furniture maker with over 15 years of experience in fine joinery and custom cabinetry. He trained under master craftsmen in traditional Japanese and European woodworking techniques and operates a small workshop in the Pacific Northwest. David holds certifications from the Furniture Society and regularly teaches woodworking classes at local community colleges. His work has been featured in Fine Woodworking Magazine and Popular Woodworking.

35 Articles
View All Posts