Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Enterprise Mac security : Mac OS X (3rd ed.)
Edge C., O’Donnell D., Apress, New York, NY, 2015. 511 pp.  Type: Book (978-1-484217-11-5)
Date Reviewed: Mar 7 2016

The information technology (IT) blogs and trade press are awash in articles about the bring your own device (BYOD) phenomenon. Many corporate system users have opted to provide their own Apple laptops over the more commonly employer-provided Windows laptops. The reasons and assumptions driving this behavior won’t be addressed in this review. But understanding the security features and requirements of this alternate platform is critically important, and Enterprise Mac security covers the key concepts and techniques needed to increase Mac endpoint (laptop) security. However, this book is not for the casual user of Apple MacBooks; it does require some technical background and understanding of the recommended OS X security features. Thus, the book is most useful for system administrators and policymakers who are responsible for corporate security where there are many employees who use Mac laptops.

The authors have extensive industry experience managing Apple systems, publishing about OS X, and presenting at security-related conferences. Their coverage of Mac-related security topics is comprehensive and well written, and includes numerous helpful screen shots and examples of the relevant OS X administrative tools. And the authors emphasize that OS X and MacBooks are not necessarily “more secure” than other laptops and operating systems; they correctly point out that misuse and careless configuration and maintenance can lead to security compromises regardless of a platform’s reputation.

This book, now in its third edition, focuses on the current OS X El Capitan (10.11) release, but the content is generally applicable to prior and future OS X versions. It begins with a “quick start” chapter, suitable for casual Mac users, that covers security basics such as system defaults, user and password administration, basic encryption, FileVault, and keychains. That chapter concludes with a “Best Practices” summary directing the more experienced readers and administrators to the more detailed later chapters.

Many of the chapters highlight basic Unix security concepts and settings, since OS X is indeed based on BSD Unix. So, administrators familiar with Unix will find many of the authors’ recommendations to be quite common and understandable.

Enterprise Mac security comprises five major sections: “The Big Picture,” “Securing the Ecosystem,” “Securing the Network,” “Securely Sharing Resources,” and “Securing the Workplace.” Of particular value are the chapters on protecting applications, combating malware, and detecting intrusions. The authors also discuss and recommend open-source tools to assist in access control, such as nmap, tripwire, snort, nessus, and even metasploit, although readers are cautioned to thoroughly understand and to use these programs carefully.

One difficulty with the book is the index, which omits references to many terms and concepts mentioned in the chapters, for example, the Unix commands. A more thorough index would be helpful to OS X administrators wanting to use the book as a frequent reference.

A puzzling omission by the authors, considering their experience with US government agencies, is reference to the US Defense Information Systems Agency (DISA) security technical implementation guides (STIGs) for OS X [1], and the Center for Internet Security’s Apple OS X benchmark [2], both of which provide additional valuable information and insight for OS X security (and not just for government users).

Overall, Enterprise Mac security is a valuable resource for securing Apple OS X, and is the most current and comprehensive guide for the El Capitan release.

Reviewer:  Harry J. Foxwell Review #: CR144214 (1605-0282)
1) US Defense Information Systems Agency (DISA) Information Assurance Support Envinroment (IASE) Security Technical Implementation Guides (STIGs) for OS X, http://iase.disa.mil/stigs/os/mac/Pages/mac-os.aspx.
2) Center for Internet Security. CIS Apple OSX 10.10 Benchmark, v1.0.0. April 2, 2015. https://benchmarks.cisecurity.org/tools2/osx/CIS_Apple_OSX_10.10_Benchmark_v1.0.0.pdf.
Bookmark and Share
  Reviewer Selected
Editor Recommended
Featured Reviewer
 
 
Security and Protection (D.4.6 )
 
 
General (D.4.0 )
 
 
Macintosh OS (D.4.0 ... )
 
 
Security and Protection (K.6.5 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
A survey on malware detection using data mining techniques
Ye Y., Li T., Adjeroh D., Iyengar S.  ACM Computing Surveys 50(3): 1-40, 2017. Type: Article
Sep 22 2017
Predicting cyber attacks with Bayesian networks using unconventional signals
Okutan A., Yang S., McConky K.  CISRC 2017 (Proceedings of the 12th Annual Cyber and Information Security Research Conference, Oak Ridge, TN,  Apr 4-6, 2017) 1-4, 2017. Type: Proceedings
Jun 2 2017
Toward engineering a secure Android ecosystem: a survey of existing techniques
Xu M., Song C., Ji Y., Shih M., Lu K., Zheng C., Duan R., Jang Y., Lee B., Qian C., Lee S., Kim T.  ACM Computing Surveys 49(2): 1-47, 2016. Type: Article
Mar 9 2017
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy