NSA Offers Security Advice For Macs - InformationWeek
IoT
IoT
Mobile // Mobile Devices
Commentary
9/16/2008
06:22 PM
Thomas Claburn
Thomas Claburn
Commentary
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

NSA Offers Security Advice For Macs

The National Security Agency (NSA) has posted Security Configuration Guidelines for Apple's Mac OS X 10.5 (Leopard) operating system.

The National Security Agency (NSA) has posted Security Configuration Guidelines for Apple's Mac OS X 10.5 (Leopard) operating system.While the agency's advice may not be sufficient to stop a government agency like, say, the NSA, from accessing one's Mac, it should significantly improve one's security posture against less capable hackers.

The NSA recommends:

Don't access the Internet or read e-mail using an Admin Account. Admin Accounts should be used for system administration tasks only.

Use Apple's Software Update control panel to keep systems up-to-date. Set it to check for updates daily. In environments not connected to the Internet, verify that the SHA-1 digest of downloaded updates matches Apple's published digest.

In the System Preferences Accounts Pane, disable Automatic Login, User List, guest accounts, and sharing.

In the System Preferences Security Pane, set Require Password when waking the computer from sleep or a screensaver. Also, disable automatic login, use secure virtual memory, and disable remote control infrared receiver if present. Consider activating FileVault, particularly for portable systems.

In the Firewall tab, select "Allow only essential services." Click the Advanced button and enable Firewall Logging and Stealth Mode.

The NSA recommendations also cover securing users' home folder permissions, physical security, disabling IPv6, AirPort and other unnecessary services when not needed, disabling Setuid and Setgid binaries, configuring and using both firewalls, among other suggestions.

Check out the details at the NSA's site.

If you get stuck, you can always try picking up the phone and asking a question. You never know who might be listening.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
2017 State of the Cloud Report
As the use of public cloud becomes a given, IT leaders must navigate the transition and advocate for management tools or architectures that allow them to realize the benefits they seek. Download this report to explore the issues and how to best leverage the cloud moving forward.
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of November 6, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll