IoS Precautions
IoS Precautions
IoS Precautions
The need for security extends across every operating system and macOS is no
exception. Apple has invested heavily to provide native privacy and security features,
but the value of attacking the Mac platform increases as its enterprise market share
increases, making it a more desirable target for Malware, breaches, and vulnerability
discovery. More than ever, companies allow their employees to use macOS through
employee-choice programs. In doing so, they realized that just like any other platform,
additional security and visibility are needed.
Several security vendors offer additional solutions to protect Mac, but many of
these solutions use a security model specific to the vendor and their Windows
product instead of working with modern frameworks that macOS provides.
This makes it difficult to keep up with an ever-changing operating system.
Instead, best practice is to extend the existing macOS security model, fill in the
gaps, and add the macOS-specific value that security teams need to operate
effectively to keep their organization safe from threats.
And while Apple operating systems protect both the user and their privacy, ease of
use and productivity have always been top priorities. The Apple experience is heavily
focused on the user rather than the business in which they operate. The same can be
said for many of the security and privacy features in macOS.
You’ll learn:
• Details of available built-in macOS
In our white paper, we provide an security features
overview of the current state of macOS • How Jamf enhances these features in
security and provide guidance on the enterprise
how Apple’s security baseline can be • How Jamf extends threat detection
beyond signatures and built-in features
enhanced in an efficient, effective and
• Additional ways to extend Apple’s
user-friendly manner.
security model for advanced
enterprise security
The ultimate trust lies with the user. basis rather than at program runtime and scans
the file system for specific file names and artifacts
In the name of usability, macOS allows the end user in
associated with past malware and removes them if
many situations to “Override” Gatekeeper. A user can
discovered. This feature is largely intended to find
simply right-click the application and select “open” or
and remediate known threats that may be already
“open with”. Instead of flatly refusing to launch the
executing across the macOS population.
application, a new prompt will simply warn the user that
they are launching an unknown or potentially malicious
Extend Gatekeeper to the enterprise.
application, but Gatekeeper will allow them to do so.
It is important to note that malware that XProtect has Gatekeeper effectively operates as it is intended. It
definitively identified cannot be authorized to run by blocks untrusted applications from launching and it
However, the risk calculation is simply different in the enterprise and a more
strict and targeted approach may be desired. Therefore, Jamf Protect enforces
its own set of managed Yara rules, binary signatures, and untrusted developer
certificates that are used to scan processes upon execution regardless of whether
or not the quarantine extended attribute is present. This ensures that as new
signatures are added, and the enterprise updates its security posture, existing
applications are rescanned at next execution, not just the first time.
Detection engineering with Jamf Protect • Alert if a Microsoft Office application created
At the core of the Jamf Protect agent is a lightweight, an unexpected child to identify Office Macro
user-mode sensor (without an accompanying text) that exploitation. This example highlights the ability to
leverages one of Apple’s own logic execution engines, understand child/parent relationships and to uncover
security events is non-traditional, it allows Jamf to • Alert if other “live-off-the-land” activities are
remain closely integrated with the Apple ecosystem and being used in ways that are indicative of attacks.
analyze data on the device until necessary to collect This class of activity requires access to
child/parent and process group relationships, With Jamf Protect, client logs can be streamed to
command line parameters, etc., in order to uncover a system of record as soon as they are written to
abuses of otherwise innocuous activities (curl, ssh, the Unified Log. To ensure that only targeted data
python, etc.) is collected, Jamf Protect admins utilize the same
predicate filter language (NSPredicate) from the built in
• Track USB usage across the enterprise and report
`log stream` command line utility. With that, building
metadata about files that are being written to
systems of records for Mac log data becomes a simple
removable media.
configuration instead of a tedious collection on a
To make it easy to understand the impact of these types machine-by-machine basis. Examples include log-in and
of detections, Jamf Protect maps identified attacks to log-off, SSH, AirDrop and authorization events. If data is
the MITRE ATT&CK framework, if applicable. Coverage
TM logged to the Unified Log, Jamf Protect can collect it.
today includes use cases from across the framework,
including detection of techniques in the following
categories: Align with Apple’s standards.
Day-of-release support
• Persistence
To interface with macOS and gather the data necessary
• Initial Access for security decisions, Jamf Protect leverages native
Apple technologies. These technologies include
• Command and Control
emerging frameworks such as Apple’s Endpoint
• Defense Evasion Security API and the OpenBSM Audit framework prior.
By using these mechanisms, Jamf Protect minimizes its
• Discovery
device impact and does not run afoul of changes in
• Privilege Escalation macOS introduced in patches or major OS releases.
Patching early and often is the most commonly
• Credential Access
recommended security protocol. Security tools that
strongly adhere to day-of-release support are core to
complying with that protocol and a critical component in
Simple Unified Log collection and reporting a comprehensive defense-in-depth security strategy.
The best first step is to start leveraging Apple’s mobile device management (MDM)
framework for automated management at scale. Not only will MDM help you better
protect your organization, but it will also take much of the burden of managing and
securing your fleet off of IT.
Modern management platforms — like Jamf Pro — leverage MDM to take these
features a step further and help customize the implementation, enforcement and
reporting on valuable security tools like encryption.
...Enhance with Jamf. With Jamf Connect, organizations have:
While MDM provides a great cornerstone for any • Streamlined provisioning and authentication
organization, many wonder what else they can do out of the box for full support of remote and
to further enhance their security posture and fortify on-site employees
employee privacy. That’s where Jamf comes in.
• Automated syncing of user identities and
It’s no secret that at a certain scale, device management device credentials
becomes a big drain on team resources. More people
means more hardware, and more hardware means more • IT with full identity management capabilities across
At least, that was true before fleet management • A Zero Trust Network Access (ZTNA) solution to
platforms like Jamf Pro. replace legacy VPNs (virtual private networks) and
With patented technology like Smart Groups to help meets the needs of the modern, hybrid enterprise
organize corporate devices and automatically execute Respond and remediate threats on Mac
management functions, IT teams can spend less time
Jamf Pro provides dashboards that help keep
in the weeds of device management and have more
organizations appraised of the state of their Mac
free time for other day-to-day IT tasks. Smart Groups
devices and flags hardware that needs attention.
will keep a watchful eye over device inventories, adding
Through patented Smart Group functionality, IT admins
and removing devices from a pre-defined group in real
can target devices that need to be updated or patched
time as device status changes.
to improve their security posture. This is all done
Modern identity management on macOS remotely and can be automated, so IT never needs to
At the core of modern security is identity — secure and physically touch the device.
customized access for end users. Legacy IT relies on When pairing Jamf Protect with Jamf Pro, threat
local directory services to act as a centralized record of remediation is taken one step further. Leveraging
employee information, such as name and department. this Smart Group technology, all MDM and Jamf Pro
As security and deployment needs evolve, businesses commands can be orchestrated in response to an
must adopt a new approach to identity and access activity-based alert from Jamf Protect. This includes
management as part of their enterprise strategy. With automated network isolation, failed conditional access,
a complete cloud-based identity stack, businesses user notifications or any number of other targeted forms
unify identity across hardware and software to unlock of remediation and response. Together with Jamf Pro
functionality, advanced workflows and ultimately and Jamf Connect, attacks on a user or device can
transform business. result in credential suspension, access changes and a
Building on information from directory services, cloud- variety of other remediations around identity.
Trusted Access
Trusted Access is Jamf’s solution to security beyond
management. Trusted Access is a unique workflow
that brings together device management, user
identity and endpoint security to help organizations
create a work experience that users love and a
secure workplace that organizations trust.
By using Jamf Protect with Jamf Pro and leveraging Jamf Connect admins can ensure only trusted users are
accessing corporate applications on trusted and compliant devices. If there is an issue with an infected device, it
can be remediated quickly and brought back into service with Jamf Pro.
Trusted Access with Jamf dramatically increases the security of your modern workplace while streamlining work for
your users — regardless of where work happens.
With the right tools in place, IT and Information Security teams can confidently roll out a Mac initiative, verify and
authenticate identity and access, and fully empower users with the resources and access they need — all with the
boxes checked for security and privacy.
Take advantage of Jamf enterprise solutions today and enjoy the visibility and remediation that your modern
organization needs.
Get Started
Or contact your preferred reseller to take Jamf for a free test drive.
www.jamf.com
© 20–3 Jamf, LLC. All rights reserved.