- Introduction
- Using this Guide
- Summary of Security Hardening
- Security Hardening Guidelines
- References
- Acknowledgement
Summary of Security Hardening
This hardening guide includes the following areas:
Patching & Maintenance Strategies to perform regular checks for security updates and patches to mitigate risks in the operating system and software in a timely manner.
Physical Access Controls Steps to make the OS X host resilient to an attacker with physical console access.
Keychain Securing the central authentication repository, or keychain, to reduce the risk of unauthorized access.
Data Encryption Use of user and disk-based encryption to prevent unauthorized access to sensitive data, and to provide organizational escrow to that data.
Antivirus Solutions Solutions to mitigate the risk of viruses or other malware affecting OS X hosts.
Controlling Administrative Access An explanation of administrative privilege under OS X and how best to secure access.
Firewall Details of the provided firewall and how to use its full functionality.
Network Services Information about the available services and how to deploy them securely.
File Sharing How to share files securely.
Intrusion Detection System (IDS) Available host based, and network based IDS solutions.