Description
Book SynopsisLearn the skills and solutions required to secure your Mac's operating system, the underlying hardware, and allow users to get work done safely. This book will show you how to create a Mac that's made of steel and won't buckle when attacked!Ok, there's no such thing as unhackable. No magic tool or silver bullet will eliminate risk in all forms. Security is an ongoing journey not a simple action or software application. And that is exactly what you'll learn to masterthe foundational knowledge, skills, and mindset to holistically protect Macs. Regardless of whether it's your personal iMac or a fleet of MacBook Pro's assigned to the remote employees within your organization, you'll be able to limit access while identifying and mitigating risk unique to your environment. In addition to the information security best practices pertaining to protecting Apple computers, you'll pivot to a coherent, security-focused mindset to better understand macOS-specificsecurity. You'll learn how it work
Table of ContentsChapter 1: Security 101
· Introduction
· What is it?
· Why is it important?
· When is it necessary?
· Who is responsible for it?
Chapter 2: Risky Business
· Risk
· Assessments
· Matrix
· Tolerance/Appetite
Chapter 3: (Return of) the Mac
· macOS
· Hardware
· Software
· Distribution
· Frameworks (Security, Privacy, etc.)
Chapter 4: A World of Hurt
· Threat types
· Attack types
· Internal attacks
· External attacks
Chapter 6: The Mind of an Attacker
· Think like them
· Act like them
· Understand them
· Protect against them
Chapter 7: Hardware Solutions
· Startup
· Full-Disk Encryption
· Cable Lock
· Sensor Covers
· Accessories
· Licensed Cables
Chapter 8: Software Solutions
· Passwords
· Login
· User Account Types
· Multifactor Authentication
· FileVault
· System Preferences
· Screensaver
· Lock-screen
· Malware Protection
· Firewall
· VPN/ZTNA
· iCloud
· App Stores
· Secure Memory
· Transparency, Consent, and Control (TCC)
· Touch ID
· Apple Software Update
· 3
rd-party Patches
· File Permissions
· Sharing Permissions
· Extensions
· Backups
· Remote Wipe
Chapter 9: Work Smarter, Not Harder
· Remote Controlling your fleet
· Mobile Device Management
· Device Configuration
· App Deployment
· Securing Devices
· Automating Workflows
· Zero Touch
Chapter 10: Make a Plan and Stick to It
· Standardize your environment
· Develop workflows to address common issues
· Automate whenever possible
· Stay on top of the latest security threats
· Train users (or your friends) to recognize threats
· Align with enterprise security frameworks
· Comply with regulatory requirements
Audience: Advanced