os x security

22
Apple Technical White Paper Presented By : Rajhesh Babu OS X Security

Upload: dixie

Post on 25-Feb-2016

31 views

Category:

Documents


0 download

DESCRIPTION

OS X Security. Apple Technical White Paper Presented By : Rajhesh Babu. Contents. Introduction Overview Secure Data Storage & Deletion Public Key Infrastructure Firewalls Core Security Malware Protection Privacy Conclusion. Introduction. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: OS X Security

Apple Technical White Paper

Presented By : Rajhesh Babu

OS X Security

Page 2: OS X Security

IntroductionOverviewSecure Data Storage & DeletionPublic Key InfrastructureFirewallsCore SecurityMalware ProtectionPrivacyConclusion

Contents

Page 3: OS X Security

Security is one of the main concerns of any Operating system.

Apple strives to ensure that the core of the operating system provides critical protection for services, applications and data.

In the view for the organization’s security, all security options should be examined and the need for security must be balanced.

Introduction

Page 4: OS X Security

OS X is designed to provide concrete defenses against outside security threats with a series of protective systems.

OS X and many of it’s integrated services are built on a foundation of open source solutions.

Strong security is a benefit of open source software. An open source development approach provides the transparency to ensure OS X is as secure as possible.

OS X has a number of features designed to protect the confidentiality of users and their data.

Overview

Page 5: OS X Security

OS X provides easy-to-use methods for ensuring that files stored are securely protected using Advanced Encrypted Standard(AES).

The Data storage options include FileVault 2 and Encrypted Containers(also called as Disk Images).

OS X also provides methods for deleting files securely which prevents deleted files from being recovered.

Data deletion options include Secure Empty Trash, Secure Erase and Remote Lock and Wipe.

Secure Data Storage & Deletion

Page 6: OS X Security

FileVault 2 :FV2 was introduced in OS X Lion, provides

full disk encryption for Data-at-rest(DAR) protection.

Initial encryption is fast and unobtrusive, meaning all data is encrypted in the background.

During the setup, FV integrates a recovery key as a safety net for accessing the encrypted volume.

The two different recovery keys are personal recovery key and institutional recovery key.

With FV 2 enabled, a user must enter valid login credentials or a recovery key before the computer can access the files and continue with the boot process.

Page 7: OS X Security

Encrypted Containers – Disk Images:With the Disk Utility tool, you can easily

create encrypted Containers known as “disk images”, by using 128-bit or a stronger 256-bit AES encryption.

When the underlying disk image is encrypted, any files and folders placed under it are encrypted and decrypted automatically.

When you decrypt a disk image, blocks of file data are decrypted in real time.

This encryption/decryption process is nonintrusive to the user and creating an encrypted disk image is simple as clicking the the New Image button in Disk Utility.

Page 8: OS X Security

Secure Empty Trash:OS X includes a Secure Empty Trash command to

prevent deleted files from being recovered.You can access the same functionality and more

advanced management from the command line.Secure Erase:Just as deleting a file from a computer doesn’t truly

remove it, erasing the hard drive doesn’t truly remove the data from a drive.

Disk Utility includes a variety of options to securely erase old data on an entire drive or volume.

The secure erase options are1. Fastest : default action that occurs when you erase

or reformat a drive or volume.

Page 9: OS X Security

2. Zero Out Data : This option will write zeros over all the data at once. This is the quickest but less secure.

3. 3-pass secure : This option is a DOE-compliant 3 pass secure erase.

4. Most secure : This writes seven diff passes of information to the drive. Time consuming, but secure.

Remote Lock and Wipe :Using OS X, you organization’s IT department

can offer users a web-based method for remote locking and even wiping their systems.

IT can use Profile Manager to lock, Unlock and wipe a remote MAC without user intervention.

Page 10: OS X Security

Public key Infrastructure(PKI) is all the components (i.e hardware,software,policies,processes) and the complex interactions that occur among them.

OS X is designed as a OS based PKI where all the services are performed by the OS and not by the individual applications.

Digital Certificates : The fundamental basis of a PKI is a “digital identity”, which consists of a digital certificate and corresponding public and private keys.

Public Key Infrastructure

Page 11: OS X Security

OS X uses digital certificates to support secure collaboration and enable the following services:

AuthenticationData IntegrityEncryptionNonrepudiationTechnologies in OS X that can use digital

certificates:FileVault/encrypted disk imagesLogin WindowSafariRemote LoginMailSystem Administration

Page 12: OS X Security

Basic purpose of a firewall is to control connections made to a computer from other computers or devices on a network.

For casual users, Apple provides an “Application layer firewall” where users can control connections on a per application basis, rather than per service basis.

For IT professionals with more complex needs and knowledge, Apple provides “IPFW2 firewall” for finer grained control. Since IPFW2 processes traffic at packet level which is lower in the networking stack than the Application Layer Firewall.

Firewalls

Page 13: OS X Security

In addition to securing local data and network access, OS X employs techniques to protect the core functioning of the operating system and applications.

Some Techniques are1. Mandatory Access Controls : This access

control mechanism enforce restrictions on access to system resources. Mandatory access controls are integrated with the exec system service to prevent execution of applications that aren’t authorized.

Core Security

Page 14: OS X Security

2. Sandboxing : This helps ensure applications do only what they are intended to do and prevent malicious code from hijacking applications and OS services to run their own code.

3. Execute Disable : One of the most common techniques used by developers of malicious software to gain unauthorized access is called “buffer overflow”.To avoid this OS X has provided no-execute stack protection by taking advantage of the XD function available in recent Intel processors.

Page 15: OS X Security

Protecting data, workstations and servers within a network goes beyond encryption and access controls.

OS X is not generally associated with high risks for viruses or other forms of malware, some forms of malware have been discovered that may affect it.

Application Quarantine : Quarantining applications help prevent users and processes from accidently running applications of unknown origin, which are potentially malicious.

Malware Protection

Page 16: OS X Security

Identification and Removal : When unknown executable code is downloaded to the Mac, OS X provides protection by ensuring that the code will never execute if it’s one of the known pieces of malware.

Because the malware code is already quarantined, OS X can remove the malware and notify the user of the blocked attempt.

Antivirus Protection : When the antivirus deployment to the OS X systems within an organization is centrally managed, you can use central antivirus management to alert administrators the presence of viruses on individual systems.

Page 17: OS X Security

With increased number of devices , apps and services, the increase need for keeping personal info private.

For example : when using navigation or mapping services users must allow their private devices to provide exact location data, but revealing those details can expose private info to unauthorized service or application.

Location Services : OS X provides preference controls and ability to control location services.

Includes a Privacy Pane – for enabling and disabling location services as well as usage of data.

Privacy

Page 18: OS X Security

Online Privacy : A Privacy pane provides info about and control over online privacy.

Users can clear website data, customize cookie settings and decide whether websites can request location information.

Privacy pane in Safari also includes web history, where each site is stored and what data is stored on the Mac.

Page 19: OS X Security

Security is the ever-present concern of every IT department regardless of the OS they use.

OS X offers a solid set of security components that are built-in to every Mac.

Industry-standard solutions and meeting the security guidelines from the U.S federal government agencies make the impact of security.

Conclusion

Page 20: OS X Security

Apple’s Technical White Paper

http://www.securemac.com/macosxsecurity.php

https://www.apple.com/mac/

http://en.wikipedia.org/wiki/Mac_OS

http://en.wikipedia.org/wiki/OS_X

References

Page 21: OS X Security

Questions???

Page 22: OS X Security

Thank you