Newsletter

03.01.2021 | 5'' read

A peek inside Apple’s security garden

by Ryan Naraine

[ If you were forwarded this newsletter from a friend, consider subscribing here.   
For regular chit-chat, daily updates and announcements, follow me on Twitter and LinkedIn ]

Monday blues, 3/1/2021:

I wrote a short piece on my decision to leave Intel Corp. late last year to expand Security Conversations into a full-fledged property focused on telling long-form stories about entrepreneurship, innovation and defense.

Having spent the last decade of my career on the vendor side of the house (at Kaspersky, Bishop Fox and Intel), I’ve seen the gears of defensive innovation grind slowly forward and I want to really share in that “boring, but sexy” excitement with you all.

There are fascinating stories in defense and they’re worth the time to gather and tell them.  Drop a line if you have a suggestion on guests for the podcast or stories for the newsletter. Under-represented folks to the front of the line.

On to the newsletter…

A (fun) peek inside the Apple security garden:

Everyone knows that Apple’s cult-like devotion to secrecy extends well into security.  It’s near impossible to get information out of Cupertino on routine security questions but, on the flip side, the ongoing delivery of the Apple Platform Security Guide (direct PDF) should earn Ivan Krstic and team and pat on the back.

The deep-dive guide is chock-full of defensive news stories and some journalists are starting to highlight the code changes and design principles powering defense on iPhones, iPad and MacOS devices. My pal Rich Mogull’s analysis for TidBITS is superb and you should read it.

If you’ve long been amused bemused by Apple’s counter-productive advertising that there’s no malware on MaOS, the entire section on native MacOS anti-malware capabilities may open some eyes.  They include a rudimentary, always-on Malware Removal Tool, the use of YARA signatures for malware hunting, Gatekeeper and rootkit detection for endpoint protection.

Another nugget in Apple’s security guide is the appearance of “counter lockboxes” to thwart commercial tools offering passcode recovery, a new Sealed Key Protection (called out by Dino Dai Zovi here), and new details on the specialized iPhones being shipped to hackers to help find security vulnerabilities.
Add these to things like BlastDoor (spotted by a Googler) and it’s clear that Apple understands the value of security assurance to a company’s business ambitions.  Apple is planting its flag around privacy engineering and it’s crucial that the assurance pillar is sturdy.
Security people movements:
Reports you should already have read:
Open-source goodies:
  • Endgame is an AWS pen-testing tool that lets you use one-line commands to backdoor an AWS account’s resources with a rogue AWS account.  Hat-tip to podcast guest Sounil Yu for flagging.
  • OSV, from Google, is a vulnerability database and triage infrastructure for open-source projects.
  • Wazuh is an enterprise-ready security monitoring solution for treat detection, integrity monitoring, incident response and compliance.
  • Over at ZDNet, SJVN argues that it’s time for Chromium to stop being a Google-only open-source project.
Tangentially:

Have a fantastic week,

_ryan

PS:  The podcast is available on all platforms (AppleGoogleSpotify and Amazon).  If you enjoy the show, consider leaving a rating and review to help spread the word.

PPS: I welcome feedback. Don’t be shy ❤

|

This site uses cookies and may process personal data based on our Privacy Policy