Identity
Network
Security Assessment
Asset
Risk Management
200

These are the three supported identity providers in Jamf Security Cloud

Okta, Google, Microsoft

200

This is what ZTNA stands for

Zero Trust Network Access

200

This flag is for auditing controls using the script in Jamf Compliance Editor

--check

200

This is how many content filters can be running simultaneously

One

200

This federal law protects patients' health information

Health Insurance Portability and Accountability Act or HIPAA

400

You can connect to any identity provider that uses this protocol

OIDC

400

You can access SSH by default over this port

22

400

Jamf Compliance Editor is based on this open source project

macOS Security Compliance Project

400

These are the three PPPCs that cannot be enabled without user interaction

Screen Recording, Microphone, and Camera

400

This company prioritized a set of actions for cybersecurity to mitigate the most common cyber attacks.

Center for Internet Security (CIS)

600

Microsoft uses conditional access, Okta uses IP Zones and Policies, but Google uses this

Context Aware Access

600

This is the default communication protocol for Jamf Protect

MQTT

600

These are the control groups that Jamf Protect reports compliance on

CIS Level 1, CIS Level 2, Jamf

600

Jamf Protect is an example of an EDR, which stands for this

Endpoint Detection and Response

600

This non-regulatory agency within the U.S. Department of Commerce has produced documents such as 800-53 and Special Publication (SP) 800-219, "Automated Secure Configuration Guidance from the macOS Security Compliance Project (mSCP)”

National Institute of Standards and Technologies (NIST)

800

This form of two factor has officially been deprecated by NIST due to vulnerabilities like SIM swapping and SMS interception

SMS

800

This Class A network is owned by Apple and approved for open access by the federal government

17/8

800

A set of open standards and protocols used to automate the process of security assessments

SCAP (Security Content Automation Protocol)

800

This tool validates the integrity of a device and analyzes for any compromise remotely or via USB

JETP

800

This Apple Library for access management that was made mandatory by HSPD-12 and enables CAC and PIV technology

smartcard services

1000

This security model that grants access to systems, applications, and data based on a user’s name, location, and other factors RATHER than the role

Attribute Based Access Control

1000

Active Directory Certificate Services Connector requires this communication protocol to be open

DCOM (Distributed Component Object Model)

1000

This is the web address for all Jamf Security documentation (compliances, etc)

1000

This is an opt-in feature, particularly for Apple devices, that enhances data security by extending end-to-end encryption to a wider range of iCloud data including

Advanced Data Protections

1000

This government-wide program promotes the adoption of secure cloud services across the federal government

FedRAMP