Getting Started
Get the project files on your Mac and install the required packages. This takes about 5 minutes.
Requirements:
- Python >= 3.12.1 (3.14 is not supported)
- Recommended: Macadmins Python
- Ruby >= 3.4.4 (optional — for PDF output)
-
Clone the Repository
Section titled “Clone the Repository”Terminal window git clone https://github.com/usnistgov/macos_security.gitcd macos_securitygit checkout sequoiaReplace
sequoiawith your target macOS version (sequoia,sonoma,ventura, etc.).Prefer to download a ZIP? Click to expand
- Go to the GitHub repository
- Click the branch dropdown and select your macOS version
- Click Code → Download ZIP
- Extract and open the folder
-
Python Setup
Section titled “Python Setup”Terminal window # Create virtual environmentpython3 -m venv .venvsource .venv/bin/activate# Install requirementspip3 install -r requirements.txtHaving Python version issues? Click to expand
Check your Python version:
Terminal window python3 --versionCheck version inside the venv:
Terminal window source .venv/bin/activatepython --versionList all installed Python versions:
Terminal window ls /opt/homebrew/bin/python3*ls /usr/local/bin/python3*Create venv with a specific version:
Terminal window # Remove old venv if neededrm -rf .venv# Use full path to the Python version you want/opt/homebrew/bin/python3.13 -m venv .venvsource .venv/bin/activate -
Ruby Setup (Optional — for PDF output)
Section titled “Ruby Setup (Optional — for PDF output)”Terminal window bundle install --binstubs --path mscp_gems -
Verify Setup
Section titled “Verify Setup”Run this command to confirm everything works:
Terminal window ./scripts/generate_baseline.py -l# When done, deactivate the virtual environmentdeactivateYou should see a list of available baselines.
What You Can Do
Section titled “What You Can Do”With the project set up, you can:
- Generate baselines — Create YAML files for security frameworks (NIST, CIS, DISA STIG, etc.)
- Generate guidance — Produce HTML/PDF documentation for your baseline
- Create configuration profiles — Deploy settings via MDM
- Run compliance checks — Scan Macs against your baseline
- Customize rules — Tailor settings to your organization’s needs
Next Steps
Section titled “Next Steps” Quick Guide Step-by-step workflow for generating security compliance files.
Or explore specific topics: