: Charles Edge, William Barker, Beau Hunter, Gene Sullivan, Ken Barker
: Enterprise Mac Security: Mac OS X Snow Leopard
: Apress
: 9781430227311
: 2
: CHF 35.50
:
: Allgemeines, Lexika
: English
: 648
: Wasserzeichen/DRM
: PC/MAC/eReader/Tablet
: PDF

A common misconception in the Mac community is that Mac's operating system is more secure than others. While this might be true in certain cases, security on the Mac is still a crucial issue. When sharing is enabled or remote control applications are installed, Mac OS X faces a variety of security threats.

Enterprise Mac Security: Mac OS X Snow Leopard is a definitive, expert-driven update of the popular, slash-dotted first edition and was written in part as a companion to the SANS Institute course for Mac OS X. It contains detailed Mac OS X security information, and walkthroughs on securing systems, including the new Snow Leopard operating system.

Using the SANS Institute course as a sister, this book caters to both the beginning home user and the seasoned security professional not accustomed to the Mac, establishing best practices for Mac OS X for a wide audience.

The authors of this book are seasoned Mac and security professionals, having built many of the largest network infrastructures for Apple and spoken at both DEFCON and Black Hat on OS X security.



Charles Edge has been working with Apple products since he was a child. Professionally, Charles started with the Mac OS and Apple server offerings in 1999 after years working with various flavors of Unix. Charles began his consulting career working with Support Technologies and Andersen Consulting. In 2000, he found a new home at 318, Inc., a consulting firm in Santa Monica, California which is now the largest Mac consultancy in the country. At 318, Charles leads a team of over 40 engineers and has worked with network architecture, security and storage for various vertical and horizontal markets. Charles has spoken at a variety of conferences including DefCon, BlackHat, LinuxWorld, MacWorld and the WorldWide Developers Conference. Charles' first book, Mac Tiger Server Little Black Book, can be purchased through Paraglyph Press. Charles recently hung up his surfboard and moved to Minneapolis, Minnesota, with his wife, Lisa. Charles can be contacted at krypted@mac.com.
Title Page1
Copyright Page2
Contents at a Glance4
Table of Contents5
About the Authors15
About the Technical Reviewer16
Acknowledgments17
Introduction18
Security Beginnings: Policies18
A Word About Network Images19
Risk Management19
How This Book Is Organized20
Part 1: The Big Picture20
Part 2: Securing the Ecosystem21
Part 3: Securing the Network21
Part 4: Securely Sharing Resources22
Part 5: Securing the Workplace22
Appendixes23
Part I The Big Picture24
Chapter 1 Security Quick-Start25
Securing the Mac OS X Defaults25
Customizing System Preferences26
Accounts26
Login Options28
Passwords29
Administrators30
Security Preferences31
General31
FileVault33
Firewall35
Software Update36
Bluetooth Security38
Printer Security40
Sharing Services42
Securely Erasing Disks43
Using Secure Empty Trash45
Using Encrypted Disk Images46
Securing Your Keychains47
Best Practices49
Chapter 2 Services, Daemons, and Processes50
Introduction to Services, Daemons, and Processes50
Viewing What s Currently Running52
The Activity Monitor52
The ps Command56
The top Output57
Viewing Which Daemons Are Running59
Viewing Which Services Are Available60
Stopping Services, Daemons, and Processes61
Stopping Processes62
Stopping Daemons64
Types of launchd Services65
GUI Tools for Managing launchd65
Changing What Runs At Login66
Validating the Authenticity of Applications and Services67
Summary68
Chapter 3 Securing User Accounts69
Introducing Identification, Authentication, and Authorization69
Managing User Accounts70
Introducing the Account Types71
Adding Users to Groups73
Enabling the Superuser Account74
Setting Up Parental Controls76
Managing the Rules Put in Place82
Advanced Settings in System Preferences84
Working with Local Directory Services85
Creating a Second Local Directory Node88
External Accounts88
Restricting Access with the Command Line: sudoers89
Securing Mount Points94
SUID Applications: Getting into the Nitty-Gritty95
Creating Files with Permissions97
Summary98
Chapter 4 File System Permissions99
Mac OS File Permissions: A Brief History of Time100
POSIX Permissions101
Modes in Detail102
Inheritance104
The Sticky Bit107
The suid/sguid Bits107
POSIX in Practice108
Access Control Lists111
Access Control Entries111
Administration111
Read Permissions112
Write Permissions112
Inheritance113
Effective Permissions114
ACLs in Practice115
Administering Permissions117
Using the Finder to Manage Permissions123
Using chown and chmod to Manage Permissions124
The Hard Link Dilemma127
Using mtree to Audit File system Permissions129
Summary131
Chapter 5 Reviewing Logs and Monitoring132
What Exactly Gets Logged?132
Using Console134
Viewing Logs134
Marking Logs135
Searching Logs136
Finding Logs137
Secure.log: Security Information 101138
appfirewall.log139
Reviewing User-Specific Logs140
Reviewing Command-Line Logs142
Reviewing Library Logs143
Breaking Down Maintenance Logs143
daily.out145
Yasu146
Weekly.out147
Monthly.out148
What to Worry About148
Virtual Machine and Bootcamp Logs149
Event Viewer149
Task Manager150
Performance Alerts151
Review Regularly, Review Often152
Accountability152
Incident Response153
Summary154
Part II Securing the Ecosystem155
Chapter 6 Application Signing and Sandbox156
Application Signing156
Application Authentication158
Application Integrity160
Signature Enforcement in OS X161
Keychain Access162
The OS X Application Firewall164
Client Management MCX and Parental Controls166
Signing and Verifying Applications