These are the three supported identity providers in Jamf Security Cloud
Okta, Google, Microsoft
This is what ZTNA stands for
Zero Trust Network Access
This flag is for auditing controls using the script in Jamf Compliance Editor
--check
This is how many content filters can be running simultaneously
One
This federal law protects patients' health information
Health Insurance Portability and Accountability Act or HIPAA
You can connect to any identity provider that uses this protocol
OIDC
You can access SSH by default over this port
22
Jamf Compliance Editor is based on this open source project
macOS Security Compliance Project
These are the three PPPCs that cannot be enabled without user interaction
Screen Recording, Microphone, and Camera
This company prioritized a set of actions for cybersecurity to mitigate the most common cyber attacks.
Center for Internet Security (CIS)
Microsoft uses conditional access, Okta uses IP Zones and Policies, but Google uses this
Context Aware Access
This is the default communication protocol for Jamf Protect
MQTT
These are the control groups that Jamf Protect reports compliance on
CIS Level 1, CIS Level 2, Jamf
Jamf Protect is an example of an EDR, which stands for this
Endpoint Detection and Response
This non-regulatory agency within the U.S. Department of Commerce has produced documents such as 800-53 and Special Publication (SP) 800-219, "Automated Secure Configuration Guidance from the macOS Security Compliance Project (mSCP)”
National Institute of Standards and Technologies (NIST)
This form of two factor has officially been deprecated by NIST due to vulnerabilities like SIM swapping and SMS interception
SMS
This Class A network is owned by Apple and approved for open access by the federal government
17/8
A set of open standards and protocols used to automate the process of security assessments
SCAP (Security Content Automation Protocol)
This tool validates the integrity of a device and analyzes for any compromise remotely or via USB
JETP
This Apple Library for access management that was made mandatory by HSPD-12 and enables CAC and PIV technology
smartcard services
This security model that grants access to systems, applications, and data based on a user’s name, location, and other factors RATHER than the role
Attribute Based Access Control
Active Directory Certificate Services Connector requires this communication protocol to be open
DCOM (Distributed Component Object Model)
This is the web address for all Jamf Security documentation (compliances, etc)
This is an opt-in feature, particularly for Apple devices, that enhances data security by extending end-to-end encryption to a wider range of iCloud data including
Advanced Data Protections
This government-wide program promotes the adoption of secure cloud services across the federal government
FedRAMP