Skip to contentAbout Fig Group
Technical Guides

Cyber Essentials for Mac / macOS: configuration guide

Exactly what Cyber Essentials v3.3 requires on Mac - FileVault, Application Firewall, Gatekeeper, auto-updates, supported macOS, and the evidence assessors expect, with or without MDM.

Author

Jay Hopkins

Editor

Edited by Jack Wickham

Published

Last reviewed

Read time

7 min read

Share

Cyber Essentials for Mac / macOS: configuration guide

Cyber Essentials v3.3 applies to every Mac used for organisational work - MacBook Air, MacBook Pro, iMac, Mac mini, Mac Studio. The scheme requires FileVault 2 enabled, Application Firewall on, Gatekeeper enforcing "Mac App Store and identified developers", automatic updates on, supported macOS version (macOS 14 Sonoma or 15 Sequoia as of 2026), and a minimum 12-character password. Evidence is much easier with MDM (Jamf, Kandji, Mosyle, Intune, Addigy); without MDM you need a signed attestation per device from a trusted user - workable for micro businesses, not scalable.

1. What the scheme tests on macOS

ControlmacOS requirement
FirewallApplication Firewall on with stealth mode
Secure configurationFileVault on, Gatekeeper enforcing identified developers, minimum 12-character password, auto-lock 10 min
Security update managementAutomatic updates on, macOS 14 or later, Rapid Security Responses installed within 14 days
User access controlStandard user account for daily work; separate admin account; MFA on iCloud / IdP
Malware protectionXProtect (built-in) satisfies Option 3 whitelist; third-party EDR optional

2. Without MDM (micro business, ≤ 10 Macs)

Viable for micro-tier organisations:

  • Walk through each Mac once and enable the settings above
  • Document per-device state in a spreadsheet
  • Get a one-page signed attestation from the primary user each year confirming settings haven't changed
  • Use Activation Lock + Find My Mac for theft recovery

Exact settings:

System Settings > Privacy & Security

  • FileVault: On - save the recovery key in a password manager
  • Gatekeeper (Allow applications from): Mac App Store and identified developers
  • Firewall: On, stealth mode on, block all incoming connections

System Settings > General > Software Update

  • Automatic Updates: All four toggles on (check, download, install macOS updates, install app updates)
  • Install Security Responses & system files: On

System Settings > Lock Screen

  • Require password immediately after sleep
  • Start screen saver after 10 minutes
  • Lock screen after 15 minutes

System Settings > Users & Groups

  • Standard user for daily work
  • Separate admin account with a unique 12-character password
  • Disable automatic login

3. With MDM - much cleaner

Jamf Pro, Kandji, Mosyle, Addigy, Intune for Mac, or Workspace ONE. Each one can apply a Configuration Profile enforcing all of the above centrally. See the separate guides for:

MDM gives you two things assessors value: the ability to prove settings at scale, and the ability to re-apply settings automatically if they drift.

4. Supported macOS versions

As of 2026 Apple is actively patching:

  • macOS 15 (Sequoia) - current
  • macOS 14 (Sonoma) - N-1, still patched
  • macOS 13 (Ventura) - receiving fewer security fixes; sliding out of the supported-OS clause

Devices running macOS 12 (Monterey) or older are outside the supported window and fail the security-update-management control. On Apple Silicon this is easy - upgrade. On older Intel Macs (2017–2019) some cannot upgrade to macOS 15 - check compatibility and plan replacements.

5. Antivirus / malware protection

macOS's built-in XProtect is accepted by Cyber Essentials under Option 3 (whitelist-based application control via Gatekeeper + App Store review). You do not need to install a third-party AV to pass.

If you do layer EDR (CrowdStrike, Jamf Protect, SentinelOne, Huntress):

  • Install via MDM, not manually
  • Pre-approve system extensions and Full Disk Access via Privacy Preferences Policy Control profile
  • Ensure the dashboard shows agent health for every enrolled Mac

6. Evidence assessors expect

With MDM: a computer record export showing FileVault, firewall, Gatekeeper, password, and macOS version per device; configuration profile payload screenshots.

Without MDM: a per-device spreadsheet with the configured state and a signed user attestation. Viable up to ~10 Macs.

7. Common failure points

1. FileVault off on a MacBook handed to a new starter - usually because the onboarding checklist missed it. MDM fixes this structurally.

2. macOS 12 (Monterey) still on a couple of 2017 MacBook Airs - outside the supported-OS window. Replace.

3. Gatekeeper set to "anywhere" (actually this option is hidden on modern macOS; if you see it, it's because someone ran "sudo spctl --master-disable"). Reset via "sudo spctl --master-enable".

4. Users running as admin with no separate standard account. Create a standard account for daily work.

5. Automatic updates off because "they reboot at the wrong time." Re-enable and schedule via MDM.

What Fig checks

Our CE readiness scan reviews Mac fleets (via MDM integration or attested inventory) for every v3.3 macOS clause and flags the specific devices that fall short. Typical Mac-heavy SMEs pass first-time at >95% with MDM, ~88% without.

Start Cyber Essentials - from £299.99 + VAT | Pricing tiers | CE Plus

About the author

Jay Hopkins

Jay Hopkins

Managing Director, Fig Group

IASME-licensed Cyber Essentials AssessorIASME Cyber Assurance Assessor

Jay Hopkins is the Managing Director of Fig Group and an IASME-licensed Cyber Essentials assessor. He was previously Head of Technology for a global regulated firm. He works with UK organisations across regulated sectors on baseline compliance, supply-chain assurance, and AI-augmented security tooling.

Next step

Want to see how Fig handles this?

Discover how Fig helps organisations prepare for security assessments and maintain ongoing compliance.

Request a demo

Related solutions

Continue exploring Fig