[Infographic] macOS Native Security Configurations and osquery

Be it for macOS or my dog eating out of the trash, there is no such thing as a bullet-proof security policy. It’s all about creating a threshold of standards– something to work off of while simultaneously reducing overall risk (you know, like storing your trash can on the counter, for example).

When it comes to macOS, there are a collection of native security features that can be configured to reduce the overall attack surface. Again, even at their best they cannot be considered flawless, but can serve as a powerful baseline for an IT security team that is responsible for securely managing a fleet of Macs regardless if it is 10 machines or 10,000 machines; these can even be leveraged today as part of a personal security checklist.

We’ve created an infographic that highlights what we believe are the most meaningful macOS security features and how we advise they should be configured:

Mac Security Blog Infographic Osquery Background BLOG

Link to Download

Meeting These Configurations

There are two ways that these endpoint misconfigurations can be addressed: from the IT perspective or from the end user.

Some organizations believe in empowering the employees to make the updates to the config settings themselves. In doing so, security awareness across the organization can be improved. With this knowledge, employees are now more familiar with why and how to reduce risk and can confidently apply these measures across their personal devices. (This is huge in a time where employees commonly access corporate properties using their personal devices).

Then there (Read more...)

*** This is a Security Bloggers Network syndicated blog from Uptycs Blog authored by Harry Hayward. Read the original post at: https://www.uptycs.com/blog/infographic-macos-best-practices