[Fed-Talk] Remediating & Patching Macs
[Fed-Talk] Remediating & Patching Macs
- Subject: [Fed-Talk] Remediating & Patching Macs
- From: "Downin, David M CIV NSWCCD West Bethesda, 893" <email@hidden>
- Date: Thu, 31 Mar 2016 15:16:27 +0000
- Thread-topic: Remediating & Patching Macs
Although there is no mandate from NAVSEA or NSWC to ban macs, it seems as if they are trying to get rid of them on base.
General theme is macs are dead through attrition. Can only replace a Mac if u provide a POAM & business plan that demonstrates
how you plan to move your software off the Mac to a PC platform with the funding and timeline in place.
They complained that we were doing updates directly through Apple and not through DISA servers. Was afterwards able to give them the
link for the STIG put out by DISA/NIST section 3.2 Software Updates that states Apple Computer is a DOD approved resource for updates.
They complained that we don't have an automatic process in place to push updates to the macs. And it seems that a presentation
was given that showed Macs are not as secure as Linux & Windows machines.
What I'm looking for is how other places remediate and patch their Macs. Is there a way to push the updates to Macs? Are there any
good documented cases that show a fair comparison of how secure each platform is? I have a feeling someone saw the article that
stated Macs aren't as secure because there were more CVEs issued to OS X than any other software and ran with it. Of course,
that doesn't take into account the severity of each, time taken to patch, and probably a host of other data points I'm not thinking about.
_______________________________________________
Do not post admin requests to the list. They will be ignored.
Fed-talk mailing list (email@hidden)
Help/Unsubscribe/Update your Subscription:
This email sent to email@hidden