The macOS system must disable iCloud Private Relay.
Overview
| Finding ID | Version | Rule ID | IA Controls | Severity |
| V-259525 | APPL-14-002170 | SV-259525r958478_rule | Medium |
| Description |
| Enterprise networks may be required to audit all network traffic by policy; therefore, iCloud Private Relay must be disabled. Network administrators can also prevent the use of this feature by blocking DNS resolution of mask.icloud.com and mask-h2.icloud.com. |
| STIG | Date |
| Apple macOS 14 (Sonoma) Security Technical Implementation Guide | 2024-12-04 |
Details
| Check Text (C-63264r941195_chk) |
| Verify the macOS system is configured to disable the iCloud Private Relay with the following command: /usr/bin/osascript -l JavaScript << EOS $.NSUserDefaults.alloc.initWithSuiteName('com.apple.applicationaccess')\ .objectForKey('allowCloudPrivateRelay').js EOS If the result is not "false", this is a finding. |
| Fix Text (F-63172r941196_fix) |
| Configure the macOS system to disable the iCloud Private Relay by installing the "com.apple.applicationaccess" configuration profile. |