1 DRAFT NIST Special Publication 800-179 2 Revision 1 3 Guide to Securing macOS 10.12 4 Systems for IT Professionals 5 A NIST Security Configuration Checklist 6 7 8 9 Lee Badger 10 Murugiah Souppaya 11 Mark Trapnell 12 Eric Trapnell 13 Dylan Yaga 14 Karen Scarfone 15 16 17 18 C O M P U T E R S E C U R I T Y 19 20 21 DRAFT NIST Special Publication 800-179 22 Revision 1 23 24 Guide to Securing macOS 10.12 25 Systems for IT Professionals 26 A NIST Security Configuration Checklist 27 28 Lee Badger 29 Murugiah Souppaya 30 Mark Trapnell 31 Eric Trapnell 32 Dylan Yaga 33 Computer Security Division 34 Information Technology Laboratory 35 36 Karen Scarfone 37 Scarfone Cybersecurity 38 Clifton, VA 39 40 41 42 43 44 October 2018 45 46 47 48 49 U.S. Department of Commerce 50 Wilbur L. Ross, Jr., Secretary 51 52 National Institute of Standards and Technology 53 Walter Copan, NIST Director and Under Secretary of Commerce for Standards and Technology NIST SP 800-179 REV. 1 (DRAFT) SECURING MACOS 10.12 SYSTEMS: NIST SECURITY CONFIGURATION CHECKLIST 54 Authority 55 This publication has been developed by NIST in accordance with its statutory responsibilities under the 56 Federal Information Security Modernization Act (FISMA) of 2014, 44 U.S.C. § 3551 et seq., Public Law 57 (P.L.) 113-283. NIST is responsible for developing information security standards and guidelines, 58 including minimum requirements for federal information systems, but such standards and guidelines shall 59 not apply to national security systems without the express approval of appropriate federal officials 60 exercising policy authority over such systems. This guideline is consistent with the requirements of the 61 Office of Management and Budget (OMB) Circular A-130. 62 Nothing in this publication should be taken to contradict the standards and guidelines made mandatory 63 and binding on federal agencies by the Secretary of Commerce under statutory authority. Nor should 64 these guidelines be interpreted as altering or superseding the existing authorities of the Secretary of 65 Commerce, Director of the OMB, or any other federal official. This publication may be used by 66 nongovernmental organizations on a voluntary basis and is not subject to copyright in the United States. 67 Attribution would, however, be appreciated by NIST. 68 National Institute of Standards and Technology Special Publication 800-179 Revision 1 69 Natl. Inst. Stand. Technol. Spec. Publ. 800-179 Rev. 1, 130 pages (October 2018) 70 CODEN: NSPUE2 71 Certain commercial entities, equipment, or materials may be identified in this document in order to describe an 72 experimental procedure or concept adequately. Such identification is not intended to imply recommendation or 73 endorsement by NIST, nor is it intended to imply that the entities, materials, or equipment are necessarily the best 74 available for the purpose. 75 There may be references in this publication to other publications currently under development by NIST in 76 accordance with its assigned statutory responsibilities. The information in this publication, including concepts and 77 methodologies, may be used by federal agencies even before the completion of such companion publications. Thus, 78 until each publication is completed, current requirements, guidelines, and procedures, where they exist, remain 79 operative. For planning and transition purposes, federal agencies may wish to closely follow the development of 80 these new publications by NIST. 81 Organizations are encouraged to review all draft publications during public comment periods and provide feedback 82 to NIST. Many NIST cybersecurity publications, other than the ones noted above, are available at 83 https://csrc.nist.gov/publications. 84 85 Public comment period: October 19, 2018 through November 16, 2018 86 National Institute of Standards and Technology 87 Attn: Computer Security Division, Information Technology Laboratory 88 100 Bureau Drive (Mail Stop 8930) Gaithersburg, MD 20899-8930 89 Email: 800-179comments@nist.gov 90 All comments are subject to release under the Freedom of Information Act (FOIA). 91 i NIST SP 800-179 REV. 1 (DRAFT) SECURING MACOS 10.12 SYSTEMS: NIST SECURITY CONFIGURATION CHECKLIST 92 Reports on Computer Systems Technology 93 The Information Technology Laboratory (ITL) at the National Institute of Standards and 94 Technology (NIST) promotes the U.S. economy and public welfare by providing technical 95 leadership for the Nation’s measurement and standards infrastructure. ITL develops tests, test 96 methods, reference data, proof of concept implementations, and technical analyses to advance 97 the development and productive use of information technology. ITL’s responsibilities include the 98 development of management, administrative, technical, and physical standards and guidelines for 99 the cost-effective security and privacy of other than national security-related information in 100 federal information systems. The Special Publication 800-series reports on ITL’s research, 101 guidelines, and outreach efforts in information system security, and its collaborative activities 102 with industry, government, and academic organizations. 103 104 Abstract 105 This publication assists IT professionals in securing Apple macOS 10.12 desktop and laptop 106 systems within various environments. It provides detailed information about the security features 107 of macOS 10.12 and security configuration guidelines. The publication recommends and 108 explains tested, secure settings with the objective of simplifying the administrative burden of 109 improving the security of macOS 10.12 systems in three types of environments: Standalone, 110 Managed, and Specialized Security-Limited Functionality. 111 112 Keywords 113 Apple OS X; checklist; endpoint device security; hardening guide; host security; macOS; mobile 114 device security; operating system security; secure configuration. ii NIST SP 800-179 REV. 1 (DRAFT) SECURING MACOS 10.12 SYSTEMS: NIST SECURITY CONFIGURATION CHECKLIST 115 116 Supplemental Content 117 For additional documents that support this publication, see: 118 https://github.com/usnistgov/applesec. 119 120 Trademark Information 121 All registered trademarks or trademarks belong to their respective organizations. iii NIST SP 800-179 REV. 1 (DRAFT) SECURING MACOS 10.12 SYSTEMS: NIST SECURITY CONFIGURATION CHECKLIST 122 Table of Contents 123 Executive Summary ..................................................................................................... ix 124 Changes in SP 800-179 Revision 1 ............................................................................ xii 125 1. Introduction ............................................................................................................ 1 126 1.1 Purpose and Scope ........................................................................................ 1 127 1.2 Audience ......................................................................................................... 1 128 1.3 Document Structure ........................................................................................ 1 129 2. macOS Security Guide Development ................................................................... 3 130 2.1 macOS System Roles and Requirements ....................................................... 3 131 2.2 Security Categorization of Information and Information Systems ................... 4 132 2.3 Threats to macOS Technologies..................................................................... 6 133 2.3.1 Local Threats ........................................................................................ 6 134 2.3.2 Remote Threats .................................................................................... 9 135 2.4 macOS Environments ................................................................................... 12 136 2.4.1 Standalone ......................................................................................... 13 137 2.4.2 Managed ............................................................................................ 13 138 2.4.3 Specialized Security-Limited Functionality (SSLF) ............................. 14 139 2.5 Security Controls Documentation.................................................................. 15 140 2.6 Implementation and Testing of Security Controls ......................................... 16 141 2.7 Monitoring and Maintenance ......................................................................... 16 142 2.8 Summary of Recommendations .................................................................... 17 143 3. macOS Security Components Overview ............................................................ 19 144 3.1 System Integrity Protection ........................................................................... 19 145 3.2 Gatekeeper ................................................................................................... 19 146 3.3 Software Updates ......................................................................................... 19 147 3.4 Privacy Settings ............................................................................................ 19 148 3.5 Credential Management ................................................................................ 20 149 3.6 Host-Based Firewalls .................................................................................... 20 150 3.7 Storage Encryption ....................................................................................... 21 151
Learn Yosemite OS X from PCM’s Apple Experts Yosemite 101: OS X Support Essentials Give PCM the opportunity to train your team to support users of Apple’s Mac OS X Yosemite. Our Apple certified trainers are ready to come to your location and provide PCM’s Apple certified trainers will teach your team Yosemite OS X fundamentals and how to be efficient with you with invaluable Yosemite tools and resources. hands-on instruction. OS X Yosemite Support Essentials is a three-day, Who Should Attend hands-on course that provides an in-depth explo- • Help desk specialists, technical coordinators, ration of troubleshooting on Mac OS X v10.10 Yo- service technicians, and others who support semite. This course is designed to give you a tour Mac users. of the breadth of functionality of Mac OS X v10.10 • Technical support personnel in businesses that Yosemite and the best methods for effectively use Macs. supporting users of Mac OS X v10.10 Yosemite • Technical coordinators or power users who systems. The course is a combination of lectures manage networks of computers running and hands-on case study exercises that provide Mac OS X — such as teachers and technology practical real-world experience. specialists who manage networks or computer labs. At your location For a class at your location, PCM will provide an What You Will Learn Apple Certified Trainer, all the student materials, • The troubleshooting process and how to and an exam voucher for each attendee (up to become more efficient with available tools 6 students included in price).
Everything You Need to Know About Apple File System for Macos
WHITE PAPER Everything you need to know about Apple File System for macOS Picture it: the ship date for macOS High Sierra has arrived. Sweat drips down your face; your hands shake as you push “upgrade.” How did I get here? What will happen to my policies? Is imaging dead? Fear not, because the move from HFS+ (the current Mac file system) to Apple File System (APFS) with macOS High Sierra is a good thing. And, with this handy guide, you’ll have everything you need to prepare your environment. In short, don’t fear APFS. To see how Jamf Pro can facilitate seamless macOS High Sierra upgrades in your environment, visit: www.jamf.com • After upgrading to macOS High Sierra, end users will Wait, how did we get here? likely see less total space consumed on a volume due to new cloning options. Bonus: End users can store HFS, and the little known MFS, were introduced in 1984 up to nine quintillion files on a single volume. with the original Macintosh. Fast forward 13 years, and • APFS provides us with a new feature called HFS+ served as a major file system upgrade for the Mac. snapshots. Snapshots make backups work more In fact, it was such a robust file system that it’s been the efficiently and offer a new way to revert changes primary file system on Apple devices. That is all about to back to a given point in time. As snapshots evolve change with APFS. and APIs become available, third-party vendors will Nineteen years after HFS+ was rolled out, Apple be able to build new workflows using this feature.
GrapherTM Registration Information Your Grapher serial number is located on the CD cover or in the email download instructions, depending on how you purchased Grapher. Register your Grapher serial number online at www.GoldenSoftware.com. This information will not be redistributed. Registration entitles you to free technical support, free minor updates, and upgrade pricing on future Grapher releases. The serial number is required when you run Grapher the first time, contact technical support, or purchase Grapher upgrades. For future reference, write your serial number on the line below. _________________________________ GrapherTM Quick Start Guide The Ultimate Technical Graphing Package Golden Software, LLC 809 14th Street, Golden, Colorado 80401-1866, U.S.A. Phone: 303-279-1021 Fax: 303-279-0909 www.GoldenSoftware.com COPYRIGHT NOTICE Copyright Golden Software, LLC 2016 The GrapherTM program is furnished under a license agreement. The Grapher software and quick start guide may be used or copied only in accordance with the terms of the agreement. It is against the law to copy the software or quick start guide on any medium except as specifically allowed in the license agreement. Contents are subject to change without notice. Grapher is a registered trademark of Golden Software, LLC. All other trademarks are the property of their respective owners. March 2016 Quick Start Guide Table of Contents Introduction to Grapher ......................................................................................1 System Requirements ........................................................................................2
Software List (1-3-2017) Information Commons BU 104 LLCD Adobe Flash Academic online JVC Pro HD Manager Chrome Acrobat Adobe Reader DC Adobe Photoshop CS6 Adobe Itunes Adobe Reader XI Comprehensive Medical Terminology Maple 16 Drive M:\ Glencoe Keyboarding Microsoft Office 2016 Firefox Itunes Microsoft Publisher Irwin/GDP Keyboarding Kurzeil 3000 MS visual studio 2015 Itunes Microsoft Office Suite 2007 Quicktime Kurzweil 3000 v.12 Quick time SPSS for Windows Maple 16 Skills bank real player Microsoft Office 2016 Vista 3-Scanners MS platform installer Windows 7 & 10 Microsoft Visio 2016 Wellington Center sharepoint MS SQL Internet Explorer XPS viewer MS Visual Studio 2015 ITunes Express for desktop Quicken deluxe 2014 McAfee Express for Web VLC Media Player Quicktime MS silverlight Windows 10 " " Media Player Statdisk Scanner Mozilla Firefox Skype 2016 MS silverlight Adobe Reader XI windows dvd maker wolfram cdf player Windows 8 Onedrive Filezilla Microsoft Office Suite 2013 notepad++ Gimp 2 Maple 16 respounds/lockdown opera mobile emulator Statdisk 3D builder VM ware/ vsphere Wolfram CDF Player MS Azure wire shark VLC Media Player cisco packet tracker MACS Software (Information Commons) 3D builder Brunswick Front Desk Computers java development kit Windows 7 System project 2016 Adobe 9 Developer notepad++ Apple Itunes Utilities IBM Iseries access for windows Time Machine Intel Management and Security TextEdit UC 222 Iseries navigator System Preferences Acrobat Reader XI Malware Bytes Anti Malware Stickies Adult Clinical Simulation Mcaffe
Best Practices for Integrating OS X with Active Directory
Apple Technical White Paper Best Practices for Integrating OS X with Active Directory OS X Mountain Lion v10.8 Contents Introduction ........................................................................................................................3 How to Integrate OS X with Active Directory .......................................................4 Enterprise Integration Challenges .............................................................................7 Deployment Strategies ..................................................................................................9 Home Directories ..............................................................................................................10 Conclusion ...........................................................................................................................11 Appendix A: More Information ....................................................................................12 Appendix B: Third-Party Add-on Solutions ............................................................13 2 Apple Technical White Paper Best Practices for Integrating OS X with Active Directory Introduction Apple’s support for Active Directory within OS X enables Mac clients and servers to integrate smoothly into existing Active Directory environments, and provides the option of deploying a single, directory services infrastructure that can support both Mac and Windows clients. Apple’s Built-in Solution Large organizations have a need to manage user identities and access across a variety
Security Analysis and Decryption of Lion Full Disk Encryption
Infiltrate the Vault: Security Analysis and Decryption of Lion Full Disk Encryption Omar Choudary Felix Grobert¨ ∗ Joachim Metz ∗ University of Cambridge felix@groebert.org joachim.metz@gmail.com omar.choudary@cl.cam.ac.uk Abstract 1 Introduction Since the launch of Mac OS X 10.7, also known as Lion, With the launch of Mac OS X 10.7 (Lion), Apple has Apple includes a volume encryption software named introduced a volume encryption mechanism known as FileVault 2 [8] in their operating system. While the pre- FileVault 2. Apple only disclosed marketing aspects of vious version of FileVault (introduced with Mac OS X the closed-source software, e.g. its use of the AES-XTS 10.3) only encrypted the home folder, FileVault 2 can en- tweakable encryption, but a publicly available security crypt the entire volume containing the operating system evaluation and detailed description was unavailable until (this is commonly referred to as full disk encryption). now. This has two major implications: first, there is now a new functional layer between the encrypted volume and We have performed an extensive analysis of the original file system (typically a version of HFS Plus). FileVault 2 and we have been able to find all the This new functional layer is actually a full volume man- algorithms and parameters needed to successfully read ager which Apple called CoreStorage [10] Although this an encrypted volume. This allows us to perform forensic full volume manager could be used for more than volume investigations on encrypted volumes using our own encryption (e.g. mirroring, snapshots or online storage tools.
How to Disable Gatekeeper and Allow Apps from Anywhere in Macos Sierra
How to Disable Gatekeeper and Allow Apps From Anywhere in macOS Sierra Gatekeeper, first introduced in OS X Mountain Lion, is a Mac security feature which prevents the user from launching potentially harmful applications. In macOS Sierra, however, Apple made some important changes to Gatekeeper that seemingly limit the choices of power users. But don’t worry, Gatekeeper can still be disabled in Sierra. Here’s how. Stand out at the party or promote your business with colorful powder coated and custom engraved Yeti tumblers from Perfect Etch. Traditionally, Gatekeeper offered three settings of increasing security: anywhere, App Store and identified developers, and App Store only. The first choice, as its name describes, allowed users to launch applications from any source, effectively disabling the Gatekeeper feature. The second choice allowed users to run apps from the Mac App Store as well as from software developers who have registered with Apple and securely sign their applications. Finally, the most secure setting limited users to running apps obtained from the Mac App Store only. While the secure options were good ideas for less experienced Mac users, power users found Gatekeeper to be too limiting and typically sought to disable it by setting it to “Anywhere.” In macOS Sierra, however, the “Anywhere” option is gone, leaving “App Store” and “App Store and identified developers” as the only two options. Disable Gatekeeper in macOS Sierra The Gatekeeper settings can be found in System Preferences > Security & Privacy > General. The Gatekeeper options are located beneath “All apps downloaded from:” with the choice of “Anywhere” missing. Thankfully, the “Anywhere” setting can be restored to Gatekeeper in Sierra with a Terminal command.