DISA STIGS Viewer

The macOS system must disable iCloud Private Relay.

Overview

Finding ID Version Rule ID IA Controls Severity
V-268524 APPL-15-002170 SV-268524r1034512_rule   Medium
Description
Enterprise networks may be required to audit all network traffic by policy; therefore, iCloud Private Relay must be disabled. Network administrators can also prevent the use of this feature by blocking DNS resolution of mask.icloud.com and mask-h2.icloud.com.
STIG Date
Apple macOS 15 (Sequoia) Security Technical Implementation Guide 2025-05-05

Details

Check Text (C-72554r1034510_chk)
Verify the macOS system is configured to disable the iCloud Private Relay with the following command:

/usr/bin/osascript -l JavaScript << EOS
$.NSUserDefaults.alloc.initWithSuiteName('com.apple.applicationaccess')\
.objectForKey('allowCloudPrivateRelay').js
EOS

If the result is not "false", this is a finding.
Fix Text (F-72455r1034511_fix)
Configure the macOS system to disable the iCloud Private Relay by installing the "com.apple.applicationaccess" configuration profile.