APLawrence.com -  Resources for Unix and Linux Systems, Bloggers and the self-employed

Mac OS X Security Guides

These PDF OS X security guides came out a few months back at http://www.apple.com/support/security/guides/. Although primarily concerned with corporate environments, even a home user can benefit from reading these. I downloaded the Mac OS X Security Configuration Guide (there's another version for Server).

I learned a thing or two here. For example, I didn't know this:


Time Machine illustrates the difference between mandatory access controls and the user privilege model - it allows files within Time Machine backups to be deleted only by programs related to Time Machine. From the command line, no user - not even one logged in as root - can delete files in a Time Machine backup.

It's true:

sh-3.2# pwd
/Volumes/IOMEGA500/Backups.backupdb/MacBook/2008-09-17-105229/Macintosh
HD/Users/tony/Desktop
sh-3.2# rm -f *dmg
rm: kerio-kms-6.2.0-1255-mac.dmg: Operation not permitted
sh-3.2# 
 

So how do you get rid of ALL copies of a file you want to delete? You use Time Machine itself: the little gear icon functions differently here. When you highlight a file and pull down that menu, it has the choice "Delete from all backups".

delete all backups from time machine

Another thing I never thought of is using keychains on a portable drive. That's a little extreme for most of us, but if you travel with your system a lot, it might be worth the trouble:


Anyone attempting to access data on the portable computer needs the portable computer, portable drive, and password for the keychain stored on the portable drive. This provides an extra layer of protection if the laptop is stolen or misplaced.

This guide covers things like disabling wifi, bluetooth, usb and firewire support: even a home user might consider doing that for any of those you don't need to use.

It also covers "sandboxing" (see sandbox-exec), encrypting swap files and much more.

Worth reading.



Got something to add? Send me email.





(OLDER)    <- More Stuff -> (NEWER)    (NEWEST)   

Printer Friendly Version

-> -> Tiger and Leopard Security guides


1 comment



Increase ad revenue 50-250% with Ezoic


More Articles by

Find me on Google+

© Anthony Lawrence







Mon Nov 19 09:58:40 2012: 11436   TonyLawrence

gravatar


Apple hasn't updated any of those security guides since 10.6



------------------------
Kerio Connect Mailserver

Kerio Samepage

Kerio Control Firewall

Have you tried Searching this site?

Unix/Linux/Mac OS X support by phone, email or on-site: Support Rates

This is a Unix/Linux resource website. It contains technical articles about Unix, Linux and general computing related subjects, opinion, news, help files, how-to's, tutorials and more.

Contact us





Keeping URIs so that they will still be around in 2, 20 or 200 or even 2000 years is clearly not as simple as it sounds ... However, all over the Web, webmasters are making decisions which will make it really difficult for themselves in the future. (Tim Berners-Lee)

Solving today's problems with yesterday's technology,someday (Kevin Brooks Clark)







This post tagged: