Delete cis-policy-query-verify-iCloud-Keychain-disabled.yml (#10851)

We already have 2.1.1.1 with the `enable`/`disable` approach in the main
yaml.
This commit is contained in:
Lucas Manuel Rodriguez 2023-03-29 13:29:10 -03:00 committed by GitHub
parent 56028b25e9
commit 22774243e2
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -1,29 +0,0 @@
---
apiVersion: v1
kind: policy
spec:
name: CIS - Ensure iCloud Keychain is disabled (if your org policy is to disable it) (MDM Required)
platforms: macOS
platform: darwin
description: |
The iCloud keychain is Apple's password manager that works with macOS and iOS. The capability allows users to store passwords in either iOS or macOS for use in Safari on both platforms and other iOS-integrated applications. The most pervasive use is driven by iOS use rather than macOS. The passwords stored in a macOS keychain on an Enterprise-managed computer could be stored in Apple's cloud and then be available on a personal computer using the same account. The stored passwords could be for organizational as well as for personal accounts.
If passwords are no longer being used as organizational tokens, they are not in scope for iCloud keychain storage.
Rationale:
Ensure that the iCloud keychain is used consistently with organizational requirements.
resolution: |
The administrator should configure this via MDM profile.
Create or edit a configuration profile with the following information:
1. The PayloadType string is com.apple.applicationaccess.
2. The key to include is allowCloudKeychainSync.
3. The key must be set to <false/>.
query: |
SELECT 1 WHERE NOT EXISTS (
SELECT 1 FROM managed_policies WHERE
domain='com.apple.applicationaccess'
AND
name='allowCloudKeychainSync'
AND (value = '1' OR value = 'true')
);
purpose: Informational
tags: compliance, CIS, CIS_Level2, CIS-macos-13-2.1.1.1-disable
contributors: sharon-fdm