4.9. Summary

In this chapter, we discussed the various tools and facilities that are provided in OS 10.6 to allow for the management and provisioning of data access provided through the file system. You should have a good fundamental understanding of both POSIX and ACL permissions schemes, and should have enough knowledge to apply them for use in your collaborative environment. We also discussed using the mtree tool for auditing file system permissions and structures to help guarantee system integrity and peace-of-mind.

In the next chapter, we will discuss various logging facilities that can be used for tracking historic data, useful in forensics and non-repudiation.

Get Enterprise Mac Security: Mac OS X Snow Leopard now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.