Device Security Guidance Configuration Packs
Copyright 2021 Crown Copyright
Licensed under the Apache License, Version 2.0 (the "License"). You may not use this file except in compliance with the License.
Unless required by applicable law or agreed to in writing, software distributed under the License is released on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations.
Table of contents
- Device Security Guidance Configuration Packs
This repository contains policy packs which can be used by system management software to configure device platforms (such as Windows 10 and iOS) in accordance with NCSC device security guidance. These configurations are aimed primarily at government and other medium/large organisations.
Small businesses may find the NCSC's Small Business Guideย a better place to start, but feel free to make use of what is provided here.
Purpose of the policies
These policies contain the NCSCโs recommended settings for the deployment of new devices across your enterprise estate. The NCSC does not mandate the use of these policies, or even require that they are used exactly as provided.
These setting are offered as guidance, so it is up to you how you implement and use them. In any case, they can provide a starting point for developing a compliance benchmark, or to expedite the configuration of devices to meet our recommendations.
Guiding principles
These three principles have guided the settings encapsulated in the policies.
- Balance Security and Usability: "Security for security's sake" is not the motto for these policies and settings. The aim is to keep a balance between security and usability. While each setting will have an underlying security purpose, it is perfectly reasonable for you to choose differently in your deployment.
- Counter threats at OFFICIAL: The policies provided in this repository aim to help organisations counter "commodity threats". This means those within the UK Government's OFFICIAL Threat Model. Despite this, they can provide a starting point for considering how to configure devices that you need to protect against higher capability threat actors and the associated risks.
- Applicable to the UK: This guidance primarily targets UK government organisations, and UK businesses. If you would like installation instructions for device management software not covered in the installation section, please submit a request via Issues, using the required template, including details on how the product is being used in the UK.
Structure
The configuration packs are ordered by vendor (or operating system, then distribution, in the case of Linux), and then vendor platform. For example, Chrome OS is contained within the top-level Google folder.
Device-Security-Guidance-Configuration-Packs
โ CODE_OF_CONDUCT.md
โ LICENSE
โ README.md
โ SECURITY.md
โ
โโโโ.github
โ โโโโISSUE_TEMPLATE
โ add-new-mdm-provider.md
โ add-new-platform.md
โ change-to-configuration.md
โ change-to-text.md
โ
โโโโApple
โ โโโโiOS
โ โ NCSC_example_iOS_device_configuration.mobileconfig
โ โ NCSC_example_iOS_VPN_configuration.mobileconfig
โ โ NCSC_iOS_configurations.csv
โ โ NCSC_iOS_configurations.md
โ โ README.md
โ โ
โ โโโโmacOS
โ macos_provisioning_script.sh
โ NCSC_example_macOS_VPN_configuration.mobileconfig
โ NCSC_macOS_configurations.csv
โ NCSC_macOS_configurations.md
โ README.md
โ
โโโโGoogle
โ โโโโAndroid
โ โ NCSC_Android_configurations.csv
โ โ NCSC_Android_configurations.md
โ โ README.md
โ โ
โ โโโโChromeOS
โ NCSC_Chrome_OS_configuration.csv
โ NCSC_Chrome_OS_configurations.md
โ README.md
โ
โโโโLinux
โ โโโโUbuntuLTS
โ README.md
โ Ubuntu-LTS-post-install.sh
โ Ubuntu-LTS-seed.txt
โ
โโโโMicrosoft
โโโโWindows
โ README.md
โ
โโโโGPO
โ NCSC+MSFT_Windows_10_2004_GPO.zip
โ
โโโโMDM
โโโโConfigurations
โ Configurations_-_NCSC.csv
โ Configurations_-_NCSC.md
โ NCSC_-_Application_Control.json
โ NCSC_-_AppLocker.json
โ NCSC_-_Attack_Surface_Reduction_Rules.json
โ NCSC_-_BitLocker.json
โ NCSC_-_Credential_Guard.json
โ NCSC_-_Custom_Settings.json
โ NCSC_-_Defender_AV.json
โ NCSC_-_Defender_AV_Exclusions.json
โ NCSC_-_Defender_AV_Security_Experience.json
โ NCSC_-_Device_Control.json
โ NCSC_-_Device_Restriction.json
โ NCSC_-_Edge.json
โ NCSC_-_Firewall.json
โ NCSC_-_Firewall_Rules.json
โ NCSC_-_Google_Chrome_Settings.json
โ NCSC_-_Identity_Protections.json
โ NCSC_-_Internet_Explorer.json
โ NCSC_-_Local_Security.json
โ NCSC_-_Password.json
โ NCSC_-_Web_Protections_(DR).json
โ NCSC_-_Web_Protections_(EP).json
โ NCSC_-_Xbox_Services.json
โ
โโโโAppLocker
AppLocker_appx.xml
AppLocker_dll.xml
AppLocker_exe.xml
AppLocker_msi.xml
AppLocker_script.xml
README.md
Installation
The policies can be installed in several ways, importing directly to management software, manually added in the management software and in some cases applied directly to the device.
Google Workspace
Chrome OS, Windows, Android, and iOS
Follow these instructions forย
- Chrome OS devices
- Windows devices
- Android mobile devices
- iOS mobile devices
- Universal settings for macOS and Linux devices
Manually apply the settings, as specified in the policy file.
Microsoft Endpoint Manager
Windows
Using scripts available in Microsoft's Graph repository.ย You can import these configurations directly into your Azure tenancy by following these steps:
- Locate
DeviceConfiguration_Import_FromJSON.ps1
, this is the script that is required to import JSON-format configurations into Endpoint Manager - Run this script in PowerShell on the device you use for administration of Azure and Endpoint Manager (such as a PAW), it will prompt for your AAD credentials
- On sucessful authentication, the script will then prompt for a location for the JSON file you want to upload
- So long as the file is found, and the AAD account provided has the correct privileges, the configuration will be imported into Endpoint Manager. Policy and Profile Manager is a Built-in RBAC role which will allow configuration importing.
macOS, iOS, and Android
Follow the instructions on the Endpoint Manager pages for configurating macOS, iOS and Android and apply the configurations in the corresponding file.
Chrome OS, and Ubuntu LTS
Currently, it is not possible to manage Chrome OS or Linux using Microsoft Endpoint Manager.
Jamf Pro
macOS and iOS
Follow the instructions on how to apply settings for custom configurations for macOS and iOS mobile devices and apply the .mobileconfigs, or develop your own configurations using the policy pack as a guide.
Windows, Android, Ubuntu LTS and Chrome OS
Currently, it is not possible to manage Windows, Android, Ubuntu LTS or Chrome OS using Jamf Pro.
VMware Workspace ONE
Windows, iOS, macOS, Android, and Chrome OS
Follow the instructions on Windows desktop profiles, iOS device profiles, macOS device profiles, Android device profiles or Chrome OS device profiles and apply configurations to profiles as required
Ubuntu LTS
The provided scripts in the Ubuntu folder are expected to be deployed through a Software Configuration Manager but can also be manually deployed onto a device.
Contributing
Before suggesting a change via a pull request, please first discuss the change you wish to make via an issue within this GitHub repository.
Any changes must (to prevent rejection of a pull request):
-
be done with consideration of the three guiding principles of this project, and any contribution that just adds or removes configurations without a clearly stated reason will likely be rejected.
-
be presented alongside evidence (in the pull request or the initial issue) that you have tested the proposed changes, including details of devices and versions of the platform.
The NCSC reserves the right to refuse pull requests if they do not meet the aims of the project, or if they do not align with current NCSC guidance.
License
The NCSC's Policy Packs are released under the Apache 2.0 Licence and are covered by Crown Copyright.