SlideShare ist ein Scribd-Unternehmen logo
1 von 82
Downloaden Sie, um offline zu lesen
dshepherd@lmi.org
Endpoint Security for Mobile Devices 

2012 NIST/OCR HIPAA Security Rule 

Conference

June 6, 2012

David Shepherd, CISSP

www.LMI.org
Disclaimer

•	 “The information contained in this presentation is
neither an endorsement of any product nor criticism.
Nor does it constitute legal advice. The information
provided is the result of independent research funded
by the Office of the National Coordinator for Health
Information Technology. Users of this information
are encouraged to seek the advice of legal counsel in
order to comply with various laws and regulations.”
2
Agenda

• Introduction – Project Description

• Establishment of Test Bed
– HITEST lab description
– Devices
• Testing
– Requirements matrix
– Test scripts
– Findings
• Anomalies
• Sample Lockdown Procedures
3
Introduction – Project Description

•	 Initiative from HIT Cyber Working Group
–	 Examine practical methods for improving security of health IT
–	 Reduce security burden on end user
•	 Providers and patients must be confident that the
electronic health IT products and systems they use are
secure
•	 Several barriers to successful adoption of end user
security measures
–	 Lack of usability
–	 High complexity
–	 Misinformation
–	 User awareness
4
Introduction – Project Description

•	 Project Goal
–	 Develop and pilot test one or more methods of end to end
automated security in healthcare settings
•	 Identify and test practical steps to improve the security of PHI
•	 Increase Electronic Health Record (EHR) adoption
•	 Remove a significant barrier to the success of EHR
5
Introduction – Project Objectives

•	 ONC project objectives
–	 Remove security as a barrier to EHR adoption
–	 Identify methods to improve security of EHR products
–	 Examine the impact of diverse configurations in the HIT ecosystem
–	 Ensure that securing PHI is transparent to end users
–	 Gather information about how EHR products can improve security
–	 Leverage the investment in EHR security research across agencies
and departments
6
Introduction - Stakeholders

• Primary stakeholders
– HHS Office of the Chief Privacy Officer
– HHS Office of Civil Rights
– Health Information Technology Research Center
– National Institute of Standards and Technology
– EHR Vendors
7
Phased Approach to Project

• Phase 1: Research and Establish Test Bed

• Phase 2: Test and Evaluation
• Phase 3: Reporting
8
HITEST Lab Design

•	 Provide maximum flexibility
–	 Test software and technologies for effective security
functionality in an isolated and scalable HIT ecosystem that
simulates various EHR environments
– Realistically model the chain of HIT events and simulate 

multiple real-world operating environments, including

•	 Physician offices
•	 Hospital nursing stations
•	 Emergency departments
–	 Contains all the elements necessary to manage and
execute tests of information security at the endpoints of HIT
systems
–	 Enables accurate and efficient results reporting
9
HITEST Lab Build

10
HITEST Lab Devices

SmartPhones

Worldwide Mobile Communications Device (Phones) Sales to End Users by OS (Market Share)
OS 2010 2011 2012 2015
Symbian 37.6 19.2 5.2 0.1
Android - Various Phones 22.7 38.5 49.2 48.8
RIM - Blackberry 16 13.4 12.6 11.1
iOS - Apple iPhone 15.7 19.4 18.9 17.2
Microsoft - Windows Phone 4.2 5.6 10.8 19.5
Other Operating Systems 3.8 3.9 3.4 3.3
Source: Gartner (April 2011)
Gartner. (2011, April 7). Gartner Says Android to Command Nearly Half of Worldwide Smartphone Operating System Market by Year-
End 2012. Retrieved November 2011, from www.gartner.com: http://www.gartner.com/it/page.jsp?id=1622614
11
HITEST Lab Devices 

Smartphone devices:

Device Operating System Version
Apple iPhone 4 iOS 4.3.5 & 5.0.1
HTC Vivid Android 2.3.4 HTC Sense 3.0
Blackberry Curve OS 6.0 Bundle 2949 6.0.0.668
HTC T9295 Windows Phone Windows Phone 7.5 OS 7.10.7720.68
12
HITEST Lab Devices

Tablets

Worldwide Sales of Media Tablets to End Users by OS (Market Share)
OS 2010 2011 2012 2015
iOS - Apple iPad 83.9 68.7 63.5 47.1
Android - Various tablets 14.2 19.9 24.4 38.6
WebOS - HP TouchPad 0 4 3.9 3
QNX - RIM PlayBook 0 5.6 6.6 10
Other Operating Systems 1.3 0.6 0.5 0.2
Source: Gartner (April 2011)
Gartner. (2011, April 11). Gartner Says Apple iOS to Dominate the Media Tablet Market Through 2015, Owning More Than Half of It
for the Next Three Years. Retrieved November 2011, from www.gartner.com: http://www.gartner.com/it/page.jsp?id=1626414
13
HITEST Lab Devices

Tablet devices:

Device Operating System Version
iPad 2 iOS 4.3.5 & 5.0.1
Motorola XOOM Android Honeycomb 3.2.1
Viewsonic Viewpad Microsoft OS Windows 7 Professional
Viewsonic Viewpad Android 2.2 1.4
Blackberry Playbook QNX Software 1.0.8.6067
HP Touchpad HP webOS 3.0.5
Samsung Galaxy Tab Android OS 2.2
14
HITEST Lab Devices

PC/Laptops

United States PC Vendor Unit Shipment Estimates for 2Q11 (Units)
Company
2Q11
Shipments
2Q11 Market
Share (%)
2Q10
Shipments
2Q10 Market
Share (%)
HP 4,552,777 26.9 4,608,280 25.7
Dell 3,821,759 22.6 4,236,303 23.6
Apple 1,814,000 10.7 1,671,500 9.3
Toshiba 1,616,400 9.6 1,565,000 8.7
Acer 1,570,257 9.3 2,028,284 11.3
Others 3,539,666 20.9 3,803,974 21.2
Total 16,914,859 100 17,913,341 100
Source: Gartner (July 2011)
Gartner. (2011, July 13). Gartner Says Worldwide PC Shipments Increased 2.3 Percent in Second Quarter of 2011 . Retrieved
November 2011, from www.gartner.com: http://www.gartner.com/it/page.jsp?id=1744216
15
HITEST Lab Devices

PC/Laptops recommended by HP’s Technology Center

http://www.hp.com/sbso/solutions/healthcare/bestsellers.html
16
17
HITEST Lab Devices

Other endpoint devices:

Device Operating System
HP Probook 6565b Laptop Windows 7 Professional (64bit)
HP 505b MicroTower Desktop Windows 7 Professional (32bit)
Testing – RTM Development

•	 Security Requirements Traceability Matrix (RTM)
•	 Basis of the RTM
–	 HIPAA Security Rule (Technical Safeguards)
–	 NIST Special Pub 800-53 Revision 3
•	 Recommended Security Controls for Federal Information Systems
and Organizations
–	 NIST Special Pub 800-66 Revision 1
•	 An Introductory Resource Guide for Implementing the Health
Insurance Portability and Accountability Act (HIPAA) Security Rule
–	 Center for Internet Security (CIS) security configuration
benchmark guides
18
RTM Categories

Category Subcategory
Access Control (§ 164.312 (a))
Password Policy and Authentication
Connectivity (VPN, Network)
Session Security
Endpoint Protection
Audit Controls (§ 164.312 (b))
Auditing
Maintenance, Patching, and Administration
Integrity (§ 164.312 (c))
Maintenance, Patching, and Administration
Endpoint Protection
Person or Entity Authentication (§ 164.312 (d)) Password Policy and Authentication
Transmission Security (§ 164.312 (e)) Connectivity (VPN, Network)
19
RTM Example

Requirement no. Requirement description Standards mappings Expected test results
Password Policy and Authentication
AC-1 Secure PCs or terminals
from unauthorized use by
a key lock or an
equivalent control (e.g.
password access) when
not in use.
HIPAA §164.312(a)
NIST SP800-53 AC-11
When not in use (i.e. the device
is locked), the device requires
the user to authenticate to
unlock.
AC-2 Limit the number of
unsuccessful log-on
attempts allowed to six
(6) attempts
HIPAA §164.312(a) The device limits the number of
unsuccessful log-on attempts to
six (6)
AC-3 Force a time delay of 30
minutes before further
log-on attempts are
allowed or rejecting any
further attempts without
specific authorization
HIPAA §164.312(a) After six (6) unsuccessful log-on
attempts, the device forces a
time delay of 30 minutes before
further log-on attempts are
allowed.
Connectivity
AC-4 The organization
disables, when not
intended for use,
wireless networking
capabilities internally
embedded within
information system
components prior to
issuance and
deployment.
HIPAA §164.312(a)
NIST 800-53 AC-18
The device is configurable to
disable Wi-Fi networking. This
can be achieved through a
Airport mode (disabling all
wireless networking) or a Wi-Fi
disable setting.
Session Security
AC-5 A time-out system (e.g. a
screen saver) shall
pause the session
screen after 2 minutes of
inactivity
HIPAA §164.312(a) The device automatically locks
after 2 minutes of inactivity
20
Testing

•	 Development of Test Scripts
•	 Application of Test Scripts to devices
•	 Refinement of RTM and Results categories based on
actual testing
21
Findings – Highlights

Password to unlock
Encrypt removable media
Malicious code protection
Browser auto-fill disabled
Pass w/ Config
93%
Fail
7%
Pass
40%
Pass w/ Config
7%
Fail
53%
Pass w/ Config
20%
Pass/Fail
40%
Fail
40%
Pass
33%
Pass w/ Config
47%
Fail
20%
22
Findings

• Access requirements
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
Password to unlock
Limit password attempts
Force password attempt delay
Disable Wi-Fi if unused
Device auto lock
Block SMS preview
23
Findings

• Audit requirements

Audit Login
Acknowledge Banner
Audit Log Content - EHR Use
Audit Log Content - Device Use
Supports Standard Audit Format (CEE)
Audit logs protected
Audit logging initiated at start up
Supports System Clock
Resync System Clock
Sync System Clock at startup
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
24
Findings

• Integrity requirements – Part 1
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
Limit access to system utilities
Authorized software update and installation
Protect data-at-rest
Restrict removable digital media
Requires encrypted removable digital media
Malicious code protection
Restrict access to malicious code protection settings
25
Findings

• Integrity requirements – Part 2
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
Web broswer restricts mobile code
Requires approved and digitially signed code
Detects unauthorized software modification
Automatically reverts unauthorized modifications.
FIPS 140-2 cryptiographic modules
Default mail client uses FIPS validated cryptography
Erase device on excessive failed authentication
Broswer warns user on untrusted web sites
Browser auto-fill disabled
26
Findings

• Authentication Controls
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
Strong Authentication method
Password entry masked
Verified password change
Maximum password age
Minimum password length/complexity
Limit password reuse
Password uniqueness
Password encrypted
Password not stored for convenience
Strong EHR Authentication supported
27
Findings

• Transmission requirements
0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
Disable bluetooth when not in use
Forget Wi-Fi networks
Disable "Ask to Join Networks"
Disable autojoin networks
Disbale VPN when not in use
28
   
       
       
   
   
Heat Map Method

Apple iPhone iOS 5
Access Audit Integrity Authentication Transmission
Pass w/ Config Pass w/ Config Pass/Fail Fail Pass
Fail Fail Pass Pass w/ Config Pass w/ Config
Fail Fail Pass Pass w/ Config Pass w/ Config
Pass Pass Pass Fail Fail
Pass Fail Pass Fail Pass
Pass w/ Config Pass Pass/Fail Fail
Fail Pass w/ Config Fail
Pass Pass w/ Config Pass
Pass Pass Pass
Pass Pass Pass
Fail
Fail
21 Fail
9 Pass
2 Pass
15 Pass
29
   
   
     
     
   
   
Access Results

Apple iPhone iOS 5
Access Audit Integrity Authentication Transmission
Pass w/ Config
Fail
Fail
Pass
Pass
Pass w/ Config
2
2
0
2
Access
Pass w/ Config Password to unlock
Fail Limit password attempts
Fail Force password attempt delay
Pass Disable Wi‐Fi if unused
Pass Device auto lock
Pass w/ Config Block SMS preview
30
         
 
     
     
       
   
         
   
   
       
Audit Results

Apple iPhone iOS 5
Access Audit Integrity Authentication Transmission
Pass w/ Config Pass w/ Config
Fail Fail
Fail Fail
Pass Pass
Pass Fail
Pass w/ Config Pass
Fail
Pass
Pass
Pass
7
3
0
6
Audit
Pass w/ Config Audit Login
Fail Acknowledge Banner
Fail Audit Log Content ‐ EHR Use
Pass Audit Log Content ‐ Device Use
Fail Supports Standard Audit Format (CEE)
Pass Audit logs protected
Fail Audit logging initiated at start up
Pass Supports System Clock
Pass Resync System Clock
Pass Sync System Clock at startup
31
           
       
 
     
       
   
                   
               
         
     
     
     
           
         
           
   
Integrity Results

Apple iPhone iOS 5
Access Audit Integrity Authentication Transmission
Pass w/ Config Pass w/ Config Pass/Fail
Fail Fail Pass
Fail Fail Pass
Pass Pass Pass
Pass Fail Pass
Pass w/ Config Pass Pass/Fail
Fail Pass w/ Config
Pass Pass w/ Config
Pass Pass
Pass Pass
Fail
Fail
16 Fail
5 Pass
2 Pass
5 Pass
Integrity
Pass/Fail Limit access to system utilities
Pass Authorized software update and installation
Pass Protect data‐at‐rest
Pass Restrict removable digital media
Pass Requires encrypted removable digital media
Pass/Fail Malicious code protection
Pass w/ Config Restrict access to malicious code protection settings
Pass w/ Config Web broswer restricts mobile code
Pass Requires approved and digitially signed code
Pass Detects unauthorized software modification
Fail Automatically reverts unauthorized modifications.
Fail FIPS 140‐2 cryptiographic modules
Fail Default mail client uses FIPS validated cryptography
Pass Erase device on excessive failed authentication
Pass Broswer warns user on untrusted web sites
Pass Browser auto‐fill disabled
32
       
           
           
   
   
   
     
     
       
     
Authentication Results

Apple iPhone iOS 5
Access Audit Integrity Authentication Transmission
Pass w/ Config Pass w/ Config Pass/Fail Fail
Fail Fail Pass Pass w/ Config
Fail Fail Pass Pass w/ Config
Pass Pass Pass Fail
Pass Fail Pass Fail
Pass w/ Config Pass Pass/Fail Fail
Fail Pass w/ Config Fail
Pass Pass w/ Config Pass
Pass Pass Pass
Pass Pass Pass
Fail
Fail
19 Fail
7 Pass
2 Pass
14 Pass
Authentication
Fail Strong Authentication method
Pass w/ Config Password entry masked
Pass w/ Config Verified password change
Fail Maximum password age
Fail Minimum password length/complexity
Fail Limit password reuse
Fail Password uniqueness
Pass Password encrypted
Pass Password not stored for convenience
Pass Strong EHR Authentication supported
33
             
               
                   
   
         
   
   
Transmission Results

Apple iPhone iOS 5
Access Audit Integrity Authentication Transmission
Pass w/ Config Pass w/ Config Pass/Fail Fail Pass
Fail Fail Pass Pass w/ Config Pass w/ Config
Fail Fail Pass Pass w/ Config Pass w/ Config
Pass Pass Pass Fail Fail
Pass Fail Pass Fail Pass
Pass w/ Config Pass Pass/Fail Fail
Fail Pass w/ Config Fail
Pass Pass w/ Config Pass
Pass Pass Pass
Pass Pass Pass
Fail
Fail
21 Fail
9 Pass
2 Pass
15 Pass
Transmission
Pass Disable bluetooth when not in use
Pass w/ Config Forget Wi‐Fi networks
Pass w/ Config Disable "Ask to Join Networks"
Fail Disable autojoin networks
Pass Disbale VPN when not in use
34
   
       
       
   
   
Consolidated View

Apple iPhone iOS 5
Access Audit Integrity Authentication Transmission
Pass w/ Config Pass w/ Config Pass/Fail Fail Pass
Fail Fail Pass Pass w/ Config Pass w/ Config
Fail Fail Pass Pass w/ Config Pass w/ Config
Pass Pass Pass Fail Fail
Pass Fail Pass Fail Pass
Pass w/ Config Pass Pass/Fail Fail
Fail Pass w/ Config Fail
Pass Pass w/ Config Pass
Pass Pass Pass
Pass Pass Pass
Fail
Fail
21 Fail
9 Pass
2 Pass
15 Pass
35
   
                   
               
   
       
   
   
           
               
   
   
   
   
   
Heat Maps – Phones – Default Configuration

Apple iPhone iOS 5 HTC Vivid Android
Access Audit Integrity Authentication Transmission Access Audit Integrity Authentication Transmission
Pass w/ Config Pass w/ Config Pass/Fail Fail Pass Pass w/ Config Pass Fail Fail Pass
Fail Fail Pass Pass w/ Config Pass w/ Config Fail Pass w/ Config Fail Pass w/ Config Pass w/ Config
Fail Fail Pass Pass w/ Config Pass w/ Config Fail Fail Fail Pass w/ Config Pass w/ Config
Pass Pass Pass Fail Fail Pass Pass Fail Fail Fail
Pass Fail Pass Fail Pass Pass Fail Fail Fail Pass
Pass w/ Config Pass Pass/Fail Fail Pass w/ Config Fail Fail Fail
Fail Pass w/ Config Fail Pass Fail Fail
Pass Pass w/ Config Pass Pass Pass w/ Config Fail
Pass Pass Pass Pass Fail Pass w/ Config
Pass Pass Pass Pass Fail Pass
Fail Fail
Fail Fail
21 Fail 12 Fail
9 Pass 10 Fail
2 Pass 0 Pass
15 Pass 25 Pass w/ Config
Blackberry Curve 9300 Windows Phone
Access Audit Integrity Authentication Transmission Access Audit Integrity Authentication Transmission
Pass w/ Config Pass Fail Pass Pass Pass w/ Config Fail Fail Fail Pass
Pass w/ Config Pass Fail Pass w/ Config Fail Fail Pass w/ Config Fail Pass w/ Config Fail
Fail Fail Pass w/ Config Pass w/ Config Pass w/ Config Fail Fail Fail Pass w/ Config Fail
Pass Pass Pass w/ Config Fail Fail Pass Fail Pass/Fail Fail Fail
Pass Fail Pass w/ Config Fail Pass Pass Fail Pass Fail Fail
Pass w/ Config Fail Fail Fail Fail Fail Pass/Fail Fail
Pass Fail Fail Fail Pass Fail
Pass Pass w/ Config Pass Pass Pass/Fail Pass
Pass Fail Pass Pass Pass Fail
Pass Fail Pass w/ Config Pass Pass Fail
Fail Fail
Pass w/ Config Fail
16 Fail 11 Fail
12 Pass 4 Fail
0 Fail 3 Fail
19 Pass 29 Fail
36
   
                   
               
   
       
   
   
           
               
   
   
   
   
   
Heat Maps – Phones – After Configuration

Apple iPhone iOS 5 HTC Vivid Android
Access Audit Integrity Authentication Transmission Access Audit Integrity Authentication Transmission
Pass w/ Config Pass w/ Config Pass/Fail Fail Pass Pass w/ Config Pass Fail Fail Pass
Fail Fail Pass Pass w/ Config Pass w/ Config Fail Pass w/ Config Fail Pass w/ Config Pass w/ Config
Fail Fail Pass Pass w/ Config Pass w/ Config Fail Fail Fail Pass w/ Config Pass w/ Config
Pass Pass Pass Fail Fail Pass Pass Fail Fail Fail
Pass Fail Pass Fail Pass Pass Fail Fail Fail Pass
Pass w/ Config Pass Pass/Fail Fail Pass w/ Config Fail Fail Fail
Fail Pass w/ Config Fail Pass Fail Fail
Pass Pass w/ Config Pass Pass Pass w/ Config Fail
Pass Pass Pass Pass Fail Pass w/ Config
Pass Pass Pass Pass Fail Pass
Fail Fail
Fail Fail
21 Fail 12 Fail
9 Pass 10 Fail
2 Pass 0 Pass
15 Pass 25 Pass w/ Config
Blackberry Curve 9300 Windows Phone
Access Audit Integrity Authentication Transmission Access Audit Integrity Authentication Transmission
Pass w/ Config Pass Fail Pass Pass Pass w/ Config Fail Fail Fail Pass
Pass w/ Config Pass Fail Pass w/ Config Fail Fail Pass w/ Config Fail Pass w/ Config Fail
Fail Fail Pass w/ Config Pass w/ Config Pass w/ Config Fail Fail Fail Pass w/ Config Fail
Pass Pass Pass w/ Config Fail Fail Pass Fail Pass/Fail Fail Fail
Pass Fail Pass w/ Config Fail Pass Pass Fail Pass Fail Fail
Pass w/ Config Fail Fail Fail Fail Fail Pass/Fail Fail
Pass Fail Fail Fail Pass Fail
Pass Pass w/ Config Pass Pass Pass/Fail Pass
Pass Fail Pass Pass Pass Fail
Pass Fail Pass w/ Config Pass Pass Fail
Fail Fail
Pass w/ Config Fail
16 Fail 11 Fail
12 Pass 4 Fail
0 Fail 3 Fail
19 Pass 29 Fail
37
               
                   
               
           
   
           
       
       
       
   
   
   
   
       
           
   
   
   
           
                       
                       
               
           
       
Heat Maps - Tablets – Default Configuration

Apple iPad iOS 5
Access Audit Integrity Authentication Transmission
Pass w/ Config Pass w/ Config Pass/Fail Fail Pass
Fail Fail Pass Pass w/ Config Pass w/ Config
Fail Fail Pass Pass w/ Config Pass w/ Config
Pass Pass Pass Fail Fail
Pass Fail Pass Fail Pass
Pass w/ Config Pass Pass/Fail Fail
Fail Pass w/ Config Fail
Pass Pass w/ Config Pass
Pass Pass Pass
Pass Pass Pass
Fail
Fail
21 Fail
Pass
Pass
Pass
HP TouchPad BlackBerry Playbook
Access Audit Integrity Authentication Transmission Access Audit Integrity Authentication Transmission
Pass w/ Config Pass w/ Config Fail Fail Pass Pass w/ Config Fail Fail Fail Pass
Fail Fail Pass Pass w/ Config Fail Fail Fail Fail Pass w/ Config Fail
Fail Fail Fail Pass w/ Config Pass w/ Config Fail Fail Fail Pass w/ Config Fail
Pass Pass Pass Fail Fail Pass Fail Pass Fail Fail
Pass Fail Pass Fail Pass Pass Fail Fail Fail Pass
Pass Fail Pass/Fail Fail Pass Pass Fail Fail
Pass Fail Fail Fail Fail Fail
Pass Pass w/ Config Fail Pass Pass/Fail Pass
Pass Pass Pass Pass Fail Pass
Pass Fail Pass w/ Config Pass Pass Pass
Fail Fail
Fail Pass
15 Fail 17 Pass
7 Fail 4 Pass
1 Fail 1 Fail
24 Fail 25 Pass w/ Config
ViewSonic Android OS Motorola XOOM
Access Audit Integrity Authentication Transmission Access Audit Integrity Authentication Transmission
Fail Fail Fail Fail Pass Pass w/ Config Pass w/ Config Fail Pass w/ Config Pass
Fail Fail Fail Fail Pass w/ Config Fail Pass w/ Config Fail Pass w/ Config Pass w/ Config
Fail Fail Fail Fail Pass w/ Config Fail Fail Pass w/ Config Pass w/ Config Pass w/ Config
Pass Pass Fail Fail Fail Pass Pass Fail Fail Fail
Fail Fail Fail Fail Pass Pass Fail Fail Fail Pass
Pass Fail Fail Fail Pass Fail Fail Fail
Pass Fail Fail Pass Fail Fail
Pass Pass w/ Config Fail Pass Pass w/ Config Pass w/ Config
Pass Fail Pass w/ Config Pass Fail Pass w/ Config
Fail Fail Fail Pass Fail Pass
Fail Fail
Fail Fail
8 Fail 12 Fail
4 Fail 13 Fail
0 Fail 0 Pass
35 Fail 22 Pass w/ Config
ViewSonic Windows OS
Access
Pass w/ Config
Pass w/ Config
Pass w/ Config
Pass
Pass
Pass
14
25
3
5
Audit
Pass w/ Config
Pass w/ Config
Fail
Pass w/ Config
Pass
Pass w/ Config
Pass
Pass
Pass
Pass w/ Config
Integrity
Pass w/ Config
Pass w/ Config
Pass/Fail
Pass
Fail
Pass w/ Config
Pass w/ Config
Pass w/ Config
Pass w/ Config
Pass/Fail
Fail
Pass/Fail
Pass w/ Config
Fail
Pass
Pass w/ Config
Authentication
Pass w/ Config
Pass
Pass w/ Config
Pass w/ Config
Pass w/ Config
Pass w/ Config
Fail
Pass
Pass w/ Config
Pass
Transmission
Pass
Pass w/ Config
Pass w/ Config
Pass w/ Config
Pass
9
2
15
Samsung Galaxy
Access
Pass w/ Config
Fail
Fail
Pass
Pass
Pass w/ Config
11
10
0
26
Audit
Pass w/ Config
Fail
Fail
Pass
Fail
Fail
Pass
Pass
Pass
Pass
Integrity
Fail
Fail
Fail
Fail
Fail
Fail
Fail
Pass w/ Config
Fail
Fail
Fail
Fail
Fail
Fail
Pass
Pass w/ Config
Authentication
Fail
Pass w/ Config
Pass w/ Config
Fail
Fail
Fail
Fail
Fail
Pass w/ Config
Pass
Transmission
Pass
Pass w/ Config
Pass w/ Config
Fail
Pass
38
               
                   
               
           
   
           
       
       
       
   
   
   
   
       
           
   
   
   
           
                       
                       
               
           
       
Heat Maps - Tablets – After Configuration

ViewSonic Windows OS
Access Audit Integrity Authentication Transmission
Pass w/ Config Pass w/ Config Pass w/ Config Pass w/ Config Pass
Pass w/ Config Pass w/ Config Pass w/ Config Pass Pass w/ Config
Pass w/ Config Fail Pass/Fail Pass w/ Config Pass w/ Config
Pass Pass w/ Config Pass Pass w/ Config Pass w/ Config
Pass Pass Fail Pass w/ Config Pass
Pass Pass w/ Config Pass w/ Config Pass w/ Config
Pass Pass w/ Config Fail
Pass Pass w/ Config Pass
Pass Pass w/ Config Pass w/ Config
Pass w/ Config Pass/Fail Pass
Fail
Pass/Fail
14 Pass w/ Config
25 Fail
3 Pass
5 Pass w/ Config
HP TouchPad
Access Audit Integrity Authentication Transmission
Pass w/ Config Pass w/ Config Fail Fail Pass
Fail Fail Pass Pass w/ Config Fail
Fail Fail Fail Pass w/ Config Pass w/ Config
Pass Pass Pass Fail Fail
Pass Fail Pass Fail Pass
Pass Fail Pass/Fail Fail
Pass Fail Fail
Pass Pass w/ Config Fail
Pass Pass Pass
Pass Fail Pass w/ Config
Fail
Fail
15 Fail
7 Fail
1 Fail
24 Fail
Apple iPad iOS 5
Access Audit Integrity Authentication Transmission
Pass w/ Config Pass w/ Config Pass/Fail Fail Pass
Fail Fail Pass Pass w/ Config Pass w/ Config
Fail Fail Pass Pass w/ Config Pass w/ Config
Pass Pass Pass Fail Fail
Pass Fail Pass Fail Pass
Pass w/ Config Pass Pass/Fail Fail
Fail Pass w/ Config Fail
Pass Pass w/ Config Pass
Pass Pass Pass
Pass Pass Pass
Fail
Fail
21 Fail
9 Pass
2 Pass
15 Pass
BlackBerry Playbook
Access Audit Integrity Authentication Transmission
Pass w/ Config Fail Fail Fail Pass
Fail Fail Fail Pass w/ Config Fail
Fail Fail Fail Pass w/ Config Fail
Pass Fail Pass Fail Fail
Pass Fail Fail Fail Pass
Pass Pass Fail Fail
Fail Fail Fail
Pass Pass/Fail Pass
Pass Fail Pass
Pass Pass Pass
Fail
Pass
17 Pass
4 Pass
1 Fail
25 Pass w/ Config
ViewSonic Android OS Motorola XOOM Samsung Galaxy
Access Audit Integrity Authentication Transmission Access Audit Integrity Authentication Transmission Access Audit Integrity Authentication Transmission
Fail Fail Fail Fail Pass Pass w/ Config Pass w/ Config Fail Pass w/ Config Pass Pass w/ Config Pass w/ Config Fail Fail Pass
Fail Fail Fail Fail Pass w/ Config Fail Pass w/ Config Fail Pass w/ Config Pass w/ Config Fail Fail Fail Pass w/ Config Pass w/ Config
Fail Fail Fail Fail Pass w/ Config Fail Fail Pass w/ Config Pass w/ Config Pass w/ Config Fail Fail Fail Pass w/ Config Pass w/ Config
Pass Pass Fail Fail Fail Pass Pass Fail Fail Fail Pass Pass Fail Fail Fail
Fail Fail Fail Fail Pass Pass Fail Fail Fail Pass Pass Fail Fail Fail Pass
Pass Fail Fail Fail Pass Fail Fail Fail Pass w/ Config Fail Fail Fail
Pass Fail Fail Pass Fail Fail Pass Fail Fail
Pass Pass w/ Config Fail Pass Pass w/ Config Pass w/ Config Pass Pass w/ Config Fail
Pass Fail Pass w/ Config Pass Fail Pass w/ Config Pass Fail Pass w/ Config
Fail Fail Fail Pass Fail Pass Pass Fail Pass
Fail Fail Fail
Fail Fail Fail
8 Fail 12 Fail 11 Fail
4 Fail 13 Fail 10 Fail
0 Fail 0 Pass 0 Pass
35 Fail 22 Pass w/ Config 26 Pass w/ Config
39
                       
                   
           
                   
       
                       
       
       
               
       
       
       
       
Heat Maps - PCs – Default Configuration

HP ProBook Windows 7 HP Microtower Windows 7
Access Audit Integrity Authentication Transmission Access Audit Integrity Authentication Transmission
Pass w/ Config Pass w/ Config Pass w/ Config Pass w/ Config Pass Pass w/ Config Pass w/ Config Pass w/ Config Pass w/ Config Pass
Pass w/ Config Pass w/ Config Pass w/ Config Pass Pass w/ Config Pass w/ Config Pass w/ Config Pass w/ Config Pass Pass
Pass w/ Config Fail Pass w/ Config Pass Pass w/ Config Pass w/ Config Fail Pass w/ Config Pass Pass
Pass Pass w/ Config Pass Pass w/ Config Pass w/ Config Pass Pass w/ Config Pass Pass w/ Config Pass
Pass Pass Fail Pass w/ Config Pass Pass Pass Fail Pass w/ Config Pass
Pass Pass w/ Config Pass w/ Config Pass w/ Config Pass Pass w/ Config Pass w/ Config Pass w/ Config
Pass Pass w/ Config Fail Pass Pass w/ Config Fail
Pass Pass w/ Config Pass Pass Pass w/ Config Pass
Pass Pass w/ Config Pass w/ Config Pass Pass w/ Config Pass w/ Config
Pass w/ Config Pass/Fail Pass Pass w/ Config Pass/Fail Pass
Fail Fail
Pass w/ Config Pass w/ Config
15 Pass w/ Config 18 Pass w/ Config
26 Fail 23 Fail
1 Pass 1 Pass
5 Pass w/ Config 5 Pass w/ Config
40
                       
                   
           
                   
       
                       
       
       
               
       
       
       
       
Heat Maps - PCs – After Configuration

HP ProBook Windows 7 HP Microtower Windows 7
Access Audit Integrity Authentication Transmission Access Audit Integrity Authentication Transmission
Pass w/ Config Pass w/ Config Pass w/ Config Pass w/ Config Pass Pass w/ Config Pass w/ Config Pass w/ Config Pass w/ Config Pass
Pass w/ Config Pass w/ Config Pass w/ Config Pass Pass w/ Config Pass w/ Config Pass w/ Config Pass w/ Config Pass Pass
Pass w/ Config Fail Pass w/ Config Pass Pass w/ Config Pass w/ Config Fail Pass w/ Config Pass Pass
Pass Pass w/ Config Pass Pass w/ Config Pass w/ Config Pass Pass w/ Config Pass Pass w/ Config Pass
Pass Pass Fail Pass w/ Config Pass Pass Pass Fail Pass w/ Config Pass
Pass Pass w/ Config Pass w/ Config Pass w/ Config Pass Pass w/ Config Pass w/ Config Pass w/ Config
Pass Pass w/ Config Fail Pass Pass w/ Config Fail
Pass Pass w/ Config Pass Pass Pass w/ Config Pass
Pass Pass w/ Config Pass w/ Config Pass Pass w/ Config Pass w/ Config
Pass w/ Config Pass/Fail Pass Pass w/ Config Pass/Fail Pass
Fail Fail
Pass w/ Config Pass w/ Config
15 Pass w/ Config 18 Pass w/ Config
26 Fail 23 Fail
1 Pass 1 Pass
5 Pass w/ Config 5 Pass w/ Config
41
Configuration is Key

•	 Our tests show the importance of configuration
•	 Without configuration, none of the tested devices
could achieve more than 50% of the security
requirements
•	 With ‘on-device’ configuration, 9 of the devices were
able to meet more than 50% of the security
requirements
•	 With ‘on-device’ configuration, 87% was the highest
score achieved among the devices
42
Unexpected Findings

•	 Devices without passwords/unlocked allow access to files
via USB
•	 Android security varies greatly between vendors
•	 Blackberry PlayBook tablet runs a web server by default

–	 Creates potential vulnerabilities
•	 ViewSonic ViewPad 10 runs a capable Windows 7
– Same hardware runs Android with missing security features
•	 HP TouchPad moving toward Android applications
–	 Security implications are varied
•	 Enterprise mobile device management tools could make
devices more secure
–	 Require additional, scarce resources
43
Sample Lockdown Procedures

•	 Based on the Security Requirements Traceability
Matrix (RTM)
•	 Explains:
–	 What to do – which items need configuration
–	 How to do it – with text and graphics
•	 Address all results that are “Pass w/Config”
•	 Step by step directions to “Pass”
•	 Note:
–	 Some of these procedures are available elsewhere, but are
not specific to use in the medical ecosystem
–	 Sources and quality vary greatly
44
Sample Lockdown Procedures: Password Protection

•	 Apple iPhone
The first line of defense for
protecting the privacy of your
data on a mobile device is
to enable a password.
45
Sample Lockdown Procedures: Password Protection

•	 Apple iPhone
–	 On the Home Screen,
select the Settings Icon.
46
Sample Lockdown Procedures: Password Protection

• Apple iPhone
–	 Navigate through the

Settings display and select

General.

47
Sample Lockdown Procedures: Password Protection

•	 Apple iPhone
–	 Navigate through the
Settings display and select
General.
48
Sample Lockdown Procedures: Password Protection

• Apple iPhone
–	 In the General section,

locate Passcode Lock 

and then select.

49
Sample Lockdown Procedures: Password Protection

• Apple iPhone
–	 If the Simple Passcode is

in the ON position, Slide

to the OFF position. 

50
Sample Lockdown Procedures: Password Protection

•	 Apple iPhone
–	 If the Simple Passcode is
in the ON position, slide it
to the OFF position.
51
Sample Lockdown Procedures: Password Protection

•	 Apple iPhone
–	 If the Simple Passcode is
in the ON position, slide it
to the OFF position.
Next select
Turn Passcode On

52
of at
Sample Lockdown Procedures: Password Protection

•	 Apple iPhone
By disabling Simple Passcode,
you now can create a Complex
Password.
1. Create a password/passcode
at least eight (8) characters

in length.

2. 	 Use a combination of 

alphabetic, upper and lower 

case characters, numbers, 

and special characters. 

53
Sample Lockdown Procedures: Password Protection

• Apple iPhone
–	 Re-enter your complex

password

54
Sample Lockdown Procedures: Password Protection

•	 Apple iPhone
With password protection in
place, you will now be challenged
to enter your password the next
time the iPhone’s Auto-Lock
screen appears.
•	 The Auto-Lock timer should
not be set to greater than 3 mins.
55
Sample Lockdown Procedures: Password Protection

• Apple iPhone
Your iPhone is now

secured with password 

protection after 3 minutes

of inactivity.

56
57
Sample Lockdown Procedures: SMS Messages

• Apple iPad

It is important that
sensitive data is only
viewed by the
intended audience.
SMS
icon.
58
Sample Lockdown Procedures: SMS Messages

• Apple iPad

– To secure
Settings
messages, first
Tap on the
Settings
59
Sample Lockdown Procedures: SMS Messages

• Apple iPad
– Review the options
under the
panel and locate
Notifications
icon
center
to the
60
Sample Lockdown Procedures: SMS Messages

•	 Apple iPad
–
right.

Next select the
Messages
near the
on the panel
61
Sample Lockdown Procedures: SMS Messages

• Apple iPad

The next view shows
a variety of selections.
1. Under Alert Style,
select None
,
Show
selection to
62
Sample Lockdown Procedures: SMS Messages

• Apple iPad

2. Slide the
Preview
OFF

The next view shows
a variety of selections.
1. Under Alert Style
select None
,
Show
selection to
View in
OFF.
63
Sample Lockdown Procedures: SMS Messages

• Apple iPad

The next view shows
a variety of selections.
1. Under Alert Style
select None
2. Slide the
Preview
OFF.
3. Slide the
Lock Screen
selection to
settings
64
Sample Lockdown Procedures: SMS Messages

•	 Apple iPad
With the new
displayed.

in place, the owner of
the iPad will still be
alerted of new SMS
messages, but phone
numbers and
content will not be
65
Sample Lockdown Procedures: Form Data

•	 Galaxy Tab
To ensure privacy, it is
important that personal
data and passwords are
not retained by the web
browser of the mobile
device.
66
Sample Lockdown Procedures: Form Data

•	 Galaxy Tab
–	 Launch the internet
Browser from the
home screen.
–	 Select the Menu Key icon
located near the base of
the unit.
67
Sample Lockdown Procedures: Form Data

•	 Galaxy Tab
–	 This will bring up the
Browser Menu with a
variety of options.
–	 Tap on the Settings icon.
68
Sample Lockdown Procedures: Form Data

• Galaxy Tab
The Adjusting Browser
Page Settings is now in view.
69
Sample Lockdown Procedures: Form Data

•	 Galaxy Tab
Uncheck the following:
1. Accept cookies
70
Sample Lockdown Procedures: Form Data

•	 Galaxy Tab
Uncheck the following:
1. 	Accept cookies
2. 	Remember form data
71
Sample Lockdown Procedures: Form Data

•	 Galaxy Tab
Uncheck the following:
1. 	Accept cookies
2. 	Remember form data
3. 	Enable location
72
Sample Lockdown Procedures: Form Data

•	 Galaxy Tab
Uncheck the following:
1. 	Accept cookies
2. 	Remember form data

3. 	Enable location
4. 	Remember passwords
73
Sample Lockdown Procedures: Form Data

•	 Galaxy Tab
All options should now
be grey and inactive,
except for Show security
warnings which should
remain selected with a
checkmark.
Sample Lockdown Procedures: Security Code

•	 Windows Phone
Windows mobile has a
password protection feature
but does not currently support
Complex Passwords.
The following steps will instruct
an owner of a Windows mobile
Smartphone to enable a
numeric Security Code.
74
Sample Lockdown Procedures: Security Code

• Windows Phone
– From the Start screen, 

Tap the Arrow icon.

75
Sample Lockdown Procedures: Security Code

•	 Windows Phone
–	 In the App Menu Screen,
Slide down the options till
you reach the Settings
icon and then select.
76
Sample Lockdown Procedures: Security Code

• Windows Phone
–	 Scroll down to and Tap

lock + wallpaper.

77
Sample Lockdown Procedures: Security Code

• Windows Phone
–	 Scroll down to and Tap

lock + wallpaper.

78
Sample Lockdown Procedures

• Windows Phone
–	 Slide the Password toggle 

to enable the Security Code.

79
Sample Lockdown Procedures

• Windows Phone
–	 Slide the Password toggle 

to enable the Security Code 

When activated, 

the Password toggle 

is highlighted Blue.

80
Sample Lockdown Procedures

• Windows Phone
–	 Enable password: 

Enter and re-enter

numeric codes and then 

tap Done.

–	 Security guidelines

recommend a minimum

of 8 digits be used.

81
Sample Lockdown Procedures

• Windows Phone
With Passcode protection in
place, you will now be required
to enter it when the Lock
Screen appears after inactivity.
• The Lock Screen feature should
not be set to greater than 3 mins
82

Weitere ähnliche Inhalte

Was ist angesagt?

Absolute Software Governance-Risk-Compliance
Absolute Software Governance-Risk-ComplianceAbsolute Software Governance-Risk-Compliance
Absolute Software Governance-Risk-ComplianceSĂŠbastien Roques
 
Fault Injection on Automotive Diagnosis Protocols
Fault Injection on Automotive Diagnosis ProtocolsFault Injection on Automotive Diagnosis Protocols
Fault Injection on Automotive Diagnosis ProtocolsRiscure
 
Systems architecture with the functional safety/security emphasis
Systems architecture with the functional safety/security emphasisSystems architecture with the functional safety/security emphasis
Systems architecture with the functional safety/security emphasisAlan Tatourian
 
Guide scada and_industrial_control_systems_security
Guide scada and_industrial_control_systems_securityGuide scada and_industrial_control_systems_security
Guide scada and_industrial_control_systems_securityDeepakraj Sahu
 
How to secure HCE
How to secure HCEHow to secure HCE
How to secure HCERiscure
 
Nist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing FrameworkNist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing FrameworkMarcoAfzali
 
The Future of Quality and Regulatory for SaMD
The Future of Quality and Regulatory for SaMDThe Future of Quality and Regulatory for SaMD
The Future of Quality and Regulatory for SaMDJanel Heilbrunn
 
Cybersecurity Implementation and Certification in Practice for IoT Equipment
Cybersecurity Implementation and Certification in Practice for IoT EquipmentCybersecurity Implementation and Certification in Practice for IoT Equipment
Cybersecurity Implementation and Certification in Practice for IoT EquipmentOnward Security
 
Nist 800 82
Nist 800 82Nist 800 82
Nist 800 82majolic
 
Control review for iOS
Control review for iOSControl review for iOS
Control review for iOSWilliam Price
 
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...promediakw
 
Security Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical SystemsSecurity Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical SystemsAlan Tatourian
 
Why is it so hard to make secure chips?
Why is it so hard to make secure chips?Why is it so hard to make secure chips?
Why is it so hard to make secure chips?Riscure
 
TRITON: How it Disrupted Safety Systems and Changed the Threat Landscape of I...
TRITON: How it Disrupted Safety Systems and Changed the Threat Landscape of I...TRITON: How it Disrupted Safety Systems and Changed the Threat Landscape of I...
TRITON: How it Disrupted Safety Systems and Changed the Threat Landscape of I...Priyanka Aash
 
5 Key Considerations at the Start of SaMD Development
5 Key Considerations at the Start of SaMD Development5 Key Considerations at the Start of SaMD Development
5 Key Considerations at the Start of SaMD DevelopmentICS
 
How to secure electronic passports
How to secure electronic passportsHow to secure electronic passports
How to secure electronic passportsRiscure
 
Industrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & FrameworksIndustrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & FrameworksPriyanka Aash
 
Highly dependable automotive software
Highly dependable automotive softwareHighly dependable automotive software
Highly dependable automotive softwareAlan Tatourian
 
DEF CON 23 -COLLIN ANDERSON and TOM CROSS - export controls on intrusion soft...
DEF CON 23 -COLLIN ANDERSON and TOM CROSS - export controls on intrusion soft...DEF CON 23 -COLLIN ANDERSON and TOM CROSS - export controls on intrusion soft...
DEF CON 23 -COLLIN ANDERSON and TOM CROSS - export controls on intrusion soft...Felipe Prado
 
The journey to ICS - Extended
The journey to ICS - Extended The journey to ICS - Extended
The journey to ICS - Extended Larry Vandenaweele
 

Was ist angesagt? (20)

Absolute Software Governance-Risk-Compliance
Absolute Software Governance-Risk-ComplianceAbsolute Software Governance-Risk-Compliance
Absolute Software Governance-Risk-Compliance
 
Fault Injection on Automotive Diagnosis Protocols
Fault Injection on Automotive Diagnosis ProtocolsFault Injection on Automotive Diagnosis Protocols
Fault Injection on Automotive Diagnosis Protocols
 
Systems architecture with the functional safety/security emphasis
Systems architecture with the functional safety/security emphasisSystems architecture with the functional safety/security emphasis
Systems architecture with the functional safety/security emphasis
 
Guide scada and_industrial_control_systems_security
Guide scada and_industrial_control_systems_securityGuide scada and_industrial_control_systems_security
Guide scada and_industrial_control_systems_security
 
How to secure HCE
How to secure HCEHow to secure HCE
How to secure HCE
 
Nist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing FrameworkNist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing Framework
 
The Future of Quality and Regulatory for SaMD
The Future of Quality and Regulatory for SaMDThe Future of Quality and Regulatory for SaMD
The Future of Quality and Regulatory for SaMD
 
Cybersecurity Implementation and Certification in Practice for IoT Equipment
Cybersecurity Implementation and Certification in Practice for IoT EquipmentCybersecurity Implementation and Certification in Practice for IoT Equipment
Cybersecurity Implementation and Certification in Practice for IoT Equipment
 
Nist 800 82
Nist 800 82Nist 800 82
Nist 800 82
 
Control review for iOS
Control review for iOSControl review for iOS
Control review for iOS
 
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
 
Security Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical SystemsSecurity Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical Systems
 
Why is it so hard to make secure chips?
Why is it so hard to make secure chips?Why is it so hard to make secure chips?
Why is it so hard to make secure chips?
 
TRITON: How it Disrupted Safety Systems and Changed the Threat Landscape of I...
TRITON: How it Disrupted Safety Systems and Changed the Threat Landscape of I...TRITON: How it Disrupted Safety Systems and Changed the Threat Landscape of I...
TRITON: How it Disrupted Safety Systems and Changed the Threat Landscape of I...
 
5 Key Considerations at the Start of SaMD Development
5 Key Considerations at the Start of SaMD Development5 Key Considerations at the Start of SaMD Development
5 Key Considerations at the Start of SaMD Development
 
How to secure electronic passports
How to secure electronic passportsHow to secure electronic passports
How to secure electronic passports
 
Industrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & FrameworksIndustrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & Frameworks
 
Highly dependable automotive software
Highly dependable automotive softwareHighly dependable automotive software
Highly dependable automotive software
 
DEF CON 23 -COLLIN ANDERSON and TOM CROSS - export controls on intrusion soft...
DEF CON 23 -COLLIN ANDERSON and TOM CROSS - export controls on intrusion soft...DEF CON 23 -COLLIN ANDERSON and TOM CROSS - export controls on intrusion soft...
DEF CON 23 -COLLIN ANDERSON and TOM CROSS - export controls on intrusion soft...
 
The journey to ICS - Extended
The journey to ICS - Extended The journey to ICS - Extended
The journey to ICS - Extended
 

Andere mochten auch

Sophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser ProtectionSophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser ProtectionGiovanni Giovannelli
 
Endpoint Security Evasion
Endpoint Security EvasionEndpoint Security Evasion
Endpoint Security EvasionInvincea, Inc.
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint SecurityBen Rothke
 
Chp1 68000 microprocessor copy
Chp1 68000 microprocessor   copyChp1 68000 microprocessor   copy
Chp1 68000 microprocessor copymkazree
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint ProtectionSophos
 
Interrupt
InterruptInterrupt
Interruptanishgoel
 
Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt Sabreen Irfana
 

Andere mochten auch (12)

Lan network with Redundancy
Lan network with RedundancyLan network with Redundancy
Lan network with Redundancy
 
Sophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser ProtectionSophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser Protection
 
Endpoint Security Evasion
Endpoint Security EvasionEndpoint Security Evasion
Endpoint Security Evasion
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint Security
 
Chp1 68000 microprocessor copy
Chp1 68000 microprocessor   copyChp1 68000 microprocessor   copy
Chp1 68000 microprocessor copy
 
Interrupt
InterruptInterrupt
Interrupt
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
 
Interrupt
InterruptInterrupt
Interrupt
 
Interrupt
InterruptInterrupt
Interrupt
 
Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt
 
Interrupts
InterruptsInterrupts
Interrupts
 
Interrupts
InterruptsInterrupts
Interrupts
 

Ähnlich wie Endpoint Security for Mobile Devices

Towards a certification scheme for IoT security evaluation
Towards a certification scheme for IoT security evaluationTowards a certification scheme for IoT security evaluation
Towards a certification scheme for IoT security evaluationAxel Rennoch
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsKenny Huang Ph.D.
 
DIATOMIC APPLICATION EXPERIMENTS
DIATOMIC APPLICATION EXPERIMENTSDIATOMIC APPLICATION EXPERIMENTS
DIATOMIC APPLICATION EXPERIMENTSDiatomicEU
 
Eurosmart etsi-e-io t-scs-presentation
Eurosmart etsi-e-io t-scs-presentationEurosmart etsi-e-io t-scs-presentation
Eurosmart etsi-e-io t-scs-presentationStefane Mouille
 
Practical Advice for FDA’s 510(k) Requirements.pdf
Practical Advice for FDA’s 510(k) Requirements.pdfPractical Advice for FDA’s 510(k) Requirements.pdf
Practical Advice for FDA’s 510(k) Requirements.pdfICS
 
Smart Manufacturing
Smart ManufacturingSmart Manufacturing
Smart ManufacturingCSA Group
 
Standardizing the tee with global platform and RISC-V
Standardizing the tee with global platform and RISC-VStandardizing the tee with global platform and RISC-V
Standardizing the tee with global platform and RISC-VRISC-V International
 
IoT Security Assessment - IEEE PAR Proposal
IoT Security Assessment - IEEE PAR ProposalIoT Security Assessment - IEEE PAR Proposal
IoT Security Assessment - IEEE PAR ProposalSyam Madanapalli
 
Standards for protection of data on storage device are emerging from both the...
Standards for protection of data on storage device are emerging from both the...Standards for protection of data on storage device are emerging from both the...
Standards for protection of data on storage device are emerging from both the...CMG - The Digital Transformation Association
 
3rd Party Outsourcing Information Security Assessment Questionnaire
3rd Party Outsourcing Information Security Assessment Questionnaire3rd Party Outsourcing Information Security Assessment Questionnaire
3rd Party Outsourcing Information Security Assessment QuestionnairePriyanka Aash
 
6 Practical Steps F&B Companies Can Take to Achieve Digital Transformation
6 Practical Steps F&B Companies Can Take to Achieve Digital Transformation6 Practical Steps F&B Companies Can Take to Achieve Digital Transformation
6 Practical Steps F&B Companies Can Take to Achieve Digital TransformationSafetyChain Software
 
Getting Started with IoT by Niraj Shah
Getting Started with IoT by Niraj ShahGetting Started with IoT by Niraj Shah
Getting Started with IoT by Niraj Shahmomoahmedabad
 
Decision Matrix for IoT Product Development
Decision Matrix for IoT Product DevelopmentDecision Matrix for IoT Product Development
Decision Matrix for IoT Product DevelopmentAlexey Pyshkin
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessMicrosoft Tech Community
 
Portable Biometrics (1)
Portable Biometrics (1)Portable Biometrics (1)
Portable Biometrics (1)Torrey Hutchison
 
Dealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation StyleDealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation StyleRochester Security Summit
 
Mobile Application Single Sign-On for Public Safety First Responders
Mobile Application Single Sign-On for Public Safety First RespondersMobile Application Single Sign-On for Public Safety First Responders
Mobile Application Single Sign-On for Public Safety First RespondersAds Manager
 
Final Presentation
Final PresentationFinal Presentation
Final Presentationchris odle
 
Supply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoTSupply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoTSource Code Control Limited
 

Ähnlich wie Endpoint Security for Mobile Devices (20)

Towards a certification scheme for IoT security evaluation
Towards a certification scheme for IoT security evaluationTowards a certification scheme for IoT security evaluation
Towards a certification scheme for IoT security evaluation
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy Considerations
 
DIATOMIC APPLICATION EXPERIMENTS
DIATOMIC APPLICATION EXPERIMENTSDIATOMIC APPLICATION EXPERIMENTS
DIATOMIC APPLICATION EXPERIMENTS
 
Eurosmart etsi-e-io t-scs-presentation
Eurosmart etsi-e-io t-scs-presentationEurosmart etsi-e-io t-scs-presentation
Eurosmart etsi-e-io t-scs-presentation
 
Practical Advice for FDA’s 510(k) Requirements.pdf
Practical Advice for FDA’s 510(k) Requirements.pdfPractical Advice for FDA’s 510(k) Requirements.pdf
Practical Advice for FDA’s 510(k) Requirements.pdf
 
Smart Manufacturing
Smart ManufacturingSmart Manufacturing
Smart Manufacturing
 
Standardizing the tee with global platform and RISC-V
Standardizing the tee with global platform and RISC-VStandardizing the tee with global platform and RISC-V
Standardizing the tee with global platform and RISC-V
 
IoT Security Assessment - IEEE PAR Proposal
IoT Security Assessment - IEEE PAR ProposalIoT Security Assessment - IEEE PAR Proposal
IoT Security Assessment - IEEE PAR Proposal
 
Standards for protection of data on storage device are emerging from both the...
Standards for protection of data on storage device are emerging from both the...Standards for protection of data on storage device are emerging from both the...
Standards for protection of data on storage device are emerging from both the...
 
3rd Party Outsourcing Information Security Assessment Questionnaire
3rd Party Outsourcing Information Security Assessment Questionnaire3rd Party Outsourcing Information Security Assessment Questionnaire
3rd Party Outsourcing Information Security Assessment Questionnaire
 
6 Practical Steps F&B Companies Can Take to Achieve Digital Transformation
6 Practical Steps F&B Companies Can Take to Achieve Digital Transformation6 Practical Steps F&B Companies Can Take to Achieve Digital Transformation
6 Practical Steps F&B Companies Can Take to Achieve Digital Transformation
 
Getting Started with IoT by Niraj Shah
Getting Started with IoT by Niraj ShahGetting Started with IoT by Niraj Shah
Getting Started with IoT by Niraj Shah
 
Decision Matrix for IoT Product Development
Decision Matrix for IoT Product DevelopmentDecision Matrix for IoT Product Development
Decision Matrix for IoT Product Development
 
IIoT Endpoint Security
IIoT Endpoint Security IIoT Endpoint Security
IIoT Endpoint Security
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment Success
 
Portable Biometrics (1)
Portable Biometrics (1)Portable Biometrics (1)
Portable Biometrics (1)
 
Dealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation StyleDealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation Style
 
Mobile Application Single Sign-On for Public Safety First Responders
Mobile Application Single Sign-On for Public Safety First RespondersMobile Application Single Sign-On for Public Safety First Responders
Mobile Application Single Sign-On for Public Safety First Responders
 
Final Presentation
Final PresentationFinal Presentation
Final Presentation
 
Supply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoTSupply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoT
 

Endpoint Security for Mobile Devices

  • 1. dshepherd@lmi.org Endpoint Security for Mobile Devices 2012 NIST/OCR HIPAA Security Rule Conference June 6, 2012 David Shepherd, CISSP www.LMI.org
  • 2. Disclaimer • “The information contained in this presentation is neither an endorsement of any product nor criticism. Nor does it constitute legal advice. The information provided is the result of independent research funded by the Office of the National Coordinator for Health Information Technology. Users of this information are encouraged to seek the advice of legal counsel in order to comply with various laws and regulations.” 2
  • 3. Agenda • Introduction – Project Description • Establishment of Test Bed – HITEST lab description – Devices • Testing – Requirements matrix – Test scripts – Findings • Anomalies • Sample Lockdown Procedures 3
  • 4. Introduction – Project Description • Initiative from HIT Cyber Working Group – Examine practical methods for improving security of health IT – Reduce security burden on end user • Providers and patients must be confident that the electronic health IT products and systems they use are secure • Several barriers to successful adoption of end user security measures – Lack of usability – High complexity – Misinformation – User awareness 4
  • 5. Introduction – Project Description • Project Goal – Develop and pilot test one or more methods of end to end automated security in healthcare settings • Identify and test practical steps to improve the security of PHI • Increase Electronic Health Record (EHR) adoption • Remove a significant barrier to the success of EHR 5
  • 6. Introduction – Project Objectives • ONC project objectives – Remove security as a barrier to EHR adoption – Identify methods to improve security of EHR products – Examine the impact of diverse configurations in the HIT ecosystem – Ensure that securing PHI is transparent to end users – Gather information about how EHR products can improve security – Leverage the investment in EHR security research across agencies and departments 6
  • 7. Introduction - Stakeholders • Primary stakeholders – HHS Office of the Chief Privacy Officer – HHS Office of Civil Rights – Health Information Technology Research Center – National Institute of Standards and Technology – EHR Vendors 7
  • 8. Phased Approach to Project • Phase 1: Research and Establish Test Bed • Phase 2: Test and Evaluation • Phase 3: Reporting 8
  • 9. HITEST Lab Design • Provide maximum flexibility – Test software and technologies for effective security functionality in an isolated and scalable HIT ecosystem that simulates various EHR environments – Realistically model the chain of HIT events and simulate multiple real-world operating environments, including • Physician offices • Hospital nursing stations • Emergency departments – Contains all the elements necessary to manage and execute tests of information security at the endpoints of HIT systems – Enables accurate and efficient results reporting 9
  • 11. HITEST Lab Devices SmartPhones Worldwide Mobile Communications Device (Phones) Sales to End Users by OS (Market Share) OS 2010 2011 2012 2015 Symbian 37.6 19.2 5.2 0.1 Android - Various Phones 22.7 38.5 49.2 48.8 RIM - Blackberry 16 13.4 12.6 11.1 iOS - Apple iPhone 15.7 19.4 18.9 17.2 Microsoft - Windows Phone 4.2 5.6 10.8 19.5 Other Operating Systems 3.8 3.9 3.4 3.3 Source: Gartner (April 2011) Gartner. (2011, April 7). Gartner Says Android to Command Nearly Half of Worldwide Smartphone Operating System Market by Year- End 2012. Retrieved November 2011, from www.gartner.com: http://www.gartner.com/it/page.jsp?id=1622614 11
  • 12. HITEST Lab Devices Smartphone devices: Device Operating System Version Apple iPhone 4 iOS 4.3.5 & 5.0.1 HTC Vivid Android 2.3.4 HTC Sense 3.0 Blackberry Curve OS 6.0 Bundle 2949 6.0.0.668 HTC T9295 Windows Phone Windows Phone 7.5 OS 7.10.7720.68 12
  • 13. HITEST Lab Devices Tablets Worldwide Sales of Media Tablets to End Users by OS (Market Share) OS 2010 2011 2012 2015 iOS - Apple iPad 83.9 68.7 63.5 47.1 Android - Various tablets 14.2 19.9 24.4 38.6 WebOS - HP TouchPad 0 4 3.9 3 QNX - RIM PlayBook 0 5.6 6.6 10 Other Operating Systems 1.3 0.6 0.5 0.2 Source: Gartner (April 2011) Gartner. (2011, April 11). Gartner Says Apple iOS to Dominate the Media Tablet Market Through 2015, Owning More Than Half of It for the Next Three Years. Retrieved November 2011, from www.gartner.com: http://www.gartner.com/it/page.jsp?id=1626414 13
  • 14. HITEST Lab Devices Tablet devices: Device Operating System Version iPad 2 iOS 4.3.5 & 5.0.1 Motorola XOOM Android Honeycomb 3.2.1 Viewsonic Viewpad Microsoft OS Windows 7 Professional Viewsonic Viewpad Android 2.2 1.4 Blackberry Playbook QNX Software 1.0.8.6067 HP Touchpad HP webOS 3.0.5 Samsung Galaxy Tab Android OS 2.2 14
  • 15. HITEST Lab Devices PC/Laptops United States PC Vendor Unit Shipment Estimates for 2Q11 (Units) Company 2Q11 Shipments 2Q11 Market Share (%) 2Q10 Shipments 2Q10 Market Share (%) HP 4,552,777 26.9 4,608,280 25.7 Dell 3,821,759 22.6 4,236,303 23.6 Apple 1,814,000 10.7 1,671,500 9.3 Toshiba 1,616,400 9.6 1,565,000 8.7 Acer 1,570,257 9.3 2,028,284 11.3 Others 3,539,666 20.9 3,803,974 21.2 Total 16,914,859 100 17,913,341 100 Source: Gartner (July 2011) Gartner. (2011, July 13). Gartner Says Worldwide PC Shipments Increased 2.3 Percent in Second Quarter of 2011 . Retrieved November 2011, from www.gartner.com: http://www.gartner.com/it/page.jsp?id=1744216 15
  • 16. HITEST Lab Devices PC/Laptops recommended by HP’s Technology Center http://www.hp.com/sbso/solutions/healthcare/bestsellers.html 16
  • 17. 17 HITEST Lab Devices Other endpoint devices: Device Operating System HP Probook 6565b Laptop Windows 7 Professional (64bit) HP 505b MicroTower Desktop Windows 7 Professional (32bit)
  • 18. Testing – RTM Development • Security Requirements Traceability Matrix (RTM) • Basis of the RTM – HIPAA Security Rule (Technical Safeguards) – NIST Special Pub 800-53 Revision 3 • Recommended Security Controls for Federal Information Systems and Organizations – NIST Special Pub 800-66 Revision 1 • An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule – Center for Internet Security (CIS) security configuration benchmark guides 18
  • 19. RTM Categories Category Subcategory Access Control (§ 164.312 (a)) Password Policy and Authentication Connectivity (VPN, Network) Session Security Endpoint Protection Audit Controls (§ 164.312 (b)) Auditing Maintenance, Patching, and Administration Integrity (§ 164.312 (c)) Maintenance, Patching, and Administration Endpoint Protection Person or Entity Authentication (§ 164.312 (d)) Password Policy and Authentication Transmission Security (§ 164.312 (e)) Connectivity (VPN, Network) 19
  • 20. RTM Example Requirement no. Requirement description Standards mappings Expected test results Password Policy and Authentication AC-1 Secure PCs or terminals from unauthorized use by a key lock or an equivalent control (e.g. password access) when not in use. HIPAA §164.312(a) NIST SP800-53 AC-11 When not in use (i.e. the device is locked), the device requires the user to authenticate to unlock. AC-2 Limit the number of unsuccessful log-on attempts allowed to six (6) attempts HIPAA §164.312(a) The device limits the number of unsuccessful log-on attempts to six (6) AC-3 Force a time delay of 30 minutes before further log-on attempts are allowed or rejecting any further attempts without specific authorization HIPAA §164.312(a) After six (6) unsuccessful log-on attempts, the device forces a time delay of 30 minutes before further log-on attempts are allowed. Connectivity AC-4 The organization disables, when not intended for use, wireless networking capabilities internally embedded within information system components prior to issuance and deployment. HIPAA §164.312(a) NIST 800-53 AC-18 The device is configurable to disable Wi-Fi networking. This can be achieved through a Airport mode (disabling all wireless networking) or a Wi-Fi disable setting. Session Security AC-5 A time-out system (e.g. a screen saver) shall pause the session screen after 2 minutes of inactivity HIPAA §164.312(a) The device automatically locks after 2 minutes of inactivity 20
  • 21. Testing • Development of Test Scripts • Application of Test Scripts to devices • Refinement of RTM and Results categories based on actual testing 21
  • 22. Findings – Highlights Password to unlock Encrypt removable media Malicious code protection Browser auto-fill disabled Pass w/ Config 93% Fail 7% Pass 40% Pass w/ Config 7% Fail 53% Pass w/ Config 20% Pass/Fail 40% Fail 40% Pass 33% Pass w/ Config 47% Fail 20% 22
  • 23. Findings • Access requirements 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% Password to unlock Limit password attempts Force password attempt delay Disable Wi-Fi if unused Device auto lock Block SMS preview 23
  • 24. Findings • Audit requirements Audit Login Acknowledge Banner Audit Log Content - EHR Use Audit Log Content - Device Use Supports Standard Audit Format (CEE) Audit logs protected Audit logging initiated at start up Supports System Clock Resync System Clock Sync System Clock at startup 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% 24
  • 25. Findings • Integrity requirements – Part 1 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% Limit access to system utilities Authorized software update and installation Protect data-at-rest Restrict removable digital media Requires encrypted removable digital media Malicious code protection Restrict access to malicious code protection settings 25
  • 26. Findings • Integrity requirements – Part 2 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% Web broswer restricts mobile code Requires approved and digitially signed code Detects unauthorized software modification Automatically reverts unauthorized modifications. FIPS 140-2 cryptiographic modules Default mail client uses FIPS validated cryptography Erase device on excessive failed authentication Broswer warns user on untrusted web sites Browser auto-fill disabled 26
  • 27. Findings • Authentication Controls 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% Strong Authentication method Password entry masked Verified password change Maximum password age Minimum password length/complexity Limit password reuse Password uniqueness Password encrypted Password not stored for convenience Strong EHR Authentication supported 27
  • 28. Findings • Transmission requirements 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% Disable bluetooth when not in use Forget Wi-Fi networks Disable "Ask to Join Networks" Disable autojoin networks Disbale VPN when not in use 28
  • 29.                             Heat Map Method Apple iPhone iOS 5 Access Audit Integrity Authentication Transmission Pass w/ Config Pass w/ Config Pass/Fail Fail Pass Fail Fail Pass Pass w/ Config Pass w/ Config Fail Fail Pass Pass w/ Config Pass w/ Config Pass Pass Pass Fail Fail Pass Fail Pass Fail Pass Pass w/ Config Pass Pass/Fail Fail Fail Pass w/ Config Fail Pass Pass w/ Config Pass Pass Pass Pass Pass Pass Pass Fail Fail 21 Fail 9 Pass 2 Pass 15 Pass 29
  • 30.                             Access Results Apple iPhone iOS 5 Access Audit Integrity Authentication Transmission Pass w/ Config Fail Fail Pass Pass Pass w/ Config 2 2 0 2 Access Pass w/ Config Password to unlock Fail Limit password attempts Fail Force password attempt delay Pass Disable Wi‐Fi if unused Pass Device auto lock Pass w/ Config Block SMS preview 30
  • 31.                                                               Audit Results Apple iPhone iOS 5 Access Audit Integrity Authentication Transmission Pass w/ Config Pass w/ Config Fail Fail Fail Fail Pass Pass Pass Fail Pass w/ Config Pass Fail Pass Pass Pass 7 3 0 6 Audit Pass w/ Config Audit Login Fail Acknowledge Banner Fail Audit Log Content ‐ EHR Use Pass Audit Log Content ‐ Device Use Fail Supports Standard Audit Format (CEE) Pass Audit logs protected Fail Audit logging initiated at start up Pass Supports System Clock Pass Resync System Clock Pass Sync System Clock at startup 31
  • 32.                                                                                                                                               Integrity Results Apple iPhone iOS 5 Access Audit Integrity Authentication Transmission Pass w/ Config Pass w/ Config Pass/Fail Fail Fail Pass Fail Fail Pass Pass Pass Pass Pass Fail Pass Pass w/ Config Pass Pass/Fail Fail Pass w/ Config Pass Pass w/ Config Pass Pass Pass Pass Fail Fail 16 Fail 5 Pass 2 Pass 5 Pass Integrity Pass/Fail Limit access to system utilities Pass Authorized software update and installation Pass Protect data‐at‐rest Pass Restrict removable digital media Pass Requires encrypted removable digital media Pass/Fail Malicious code protection Pass w/ Config Restrict access to malicious code protection settings Pass w/ Config Web broswer restricts mobile code Pass Requires approved and digitially signed code Pass Detects unauthorized software modification Fail Automatically reverts unauthorized modifications. Fail FIPS 140‐2 cryptiographic modules Fail Default mail client uses FIPS validated cryptography Pass Erase device on excessive failed authentication Pass Broswer warns user on untrusted web sites Pass Browser auto‐fill disabled 32
  • 33.                                                                       Authentication Results Apple iPhone iOS 5 Access Audit Integrity Authentication Transmission Pass w/ Config Pass w/ Config Pass/Fail Fail Fail Fail Pass Pass w/ Config Fail Fail Pass Pass w/ Config Pass Pass Pass Fail Pass Fail Pass Fail Pass w/ Config Pass Pass/Fail Fail Fail Pass w/ Config Fail Pass Pass w/ Config Pass Pass Pass Pass Pass Pass Pass Fail Fail 19 Fail 7 Pass 2 Pass 14 Pass Authentication Fail Strong Authentication method Pass w/ Config Password entry masked Pass w/ Config Verified password change Fail Maximum password age Fail Minimum password length/complexity Fail Limit password reuse Fail Password uniqueness Pass Password encrypted Pass Password not stored for convenience Pass Strong EHR Authentication supported 33
  • 34.                                                                         Transmission Results Apple iPhone iOS 5 Access Audit Integrity Authentication Transmission Pass w/ Config Pass w/ Config Pass/Fail Fail Pass Fail Fail Pass Pass w/ Config Pass w/ Config Fail Fail Pass Pass w/ Config Pass w/ Config Pass Pass Pass Fail Fail Pass Fail Pass Fail Pass Pass w/ Config Pass Pass/Fail Fail Fail Pass w/ Config Fail Pass Pass w/ Config Pass Pass Pass Pass Pass Pass Pass Fail Fail 21 Fail 9 Pass 2 Pass 15 Pass Transmission Pass Disable bluetooth when not in use Pass w/ Config Forget Wi‐Fi networks Pass w/ Config Disable "Ask to Join Networks" Fail Disable autojoin networks Pass Disbale VPN when not in use 34
  • 35.                             Consolidated View Apple iPhone iOS 5 Access Audit Integrity Authentication Transmission Pass w/ Config Pass w/ Config Pass/Fail Fail Pass Fail Fail Pass Pass w/ Config Pass w/ Config Fail Fail Pass Pass w/ Config Pass w/ Config Pass Pass Pass Fail Fail Pass Fail Pass Fail Pass Pass w/ Config Pass Pass/Fail Fail Fail Pass w/ Config Fail Pass Pass w/ Config Pass Pass Pass Pass Pass Pass Pass Fail Fail 21 Fail 9 Pass 2 Pass 15 Pass 35
  • 36.                                                                                                             Heat Maps – Phones – Default Configuration Apple iPhone iOS 5 HTC Vivid Android Access Audit Integrity Authentication Transmission Access Audit Integrity Authentication Transmission Pass w/ Config Pass w/ Config Pass/Fail Fail Pass Pass w/ Config Pass Fail Fail Pass Fail Fail Pass Pass w/ Config Pass w/ Config Fail Pass w/ Config Fail Pass w/ Config Pass w/ Config Fail Fail Pass Pass w/ Config Pass w/ Config Fail Fail Fail Pass w/ Config Pass w/ Config Pass Pass Pass Fail Fail Pass Pass Fail Fail Fail Pass Fail Pass Fail Pass Pass Fail Fail Fail Pass Pass w/ Config Pass Pass/Fail Fail Pass w/ Config Fail Fail Fail Fail Pass w/ Config Fail Pass Fail Fail Pass Pass w/ Config Pass Pass Pass w/ Config Fail Pass Pass Pass Pass Fail Pass w/ Config Pass Pass Pass Pass Fail Pass Fail Fail Fail Fail 21 Fail 12 Fail 9 Pass 10 Fail 2 Pass 0 Pass 15 Pass 25 Pass w/ Config Blackberry Curve 9300 Windows Phone Access Audit Integrity Authentication Transmission Access Audit Integrity Authentication Transmission Pass w/ Config Pass Fail Pass Pass Pass w/ Config Fail Fail Fail Pass Pass w/ Config Pass Fail Pass w/ Config Fail Fail Pass w/ Config Fail Pass w/ Config Fail Fail Fail Pass w/ Config Pass w/ Config Pass w/ Config Fail Fail Fail Pass w/ Config Fail Pass Pass Pass w/ Config Fail Fail Pass Fail Pass/Fail Fail Fail Pass Fail Pass w/ Config Fail Pass Pass Fail Pass Fail Fail Pass w/ Config Fail Fail Fail Fail Fail Pass/Fail Fail Pass Fail Fail Fail Pass Fail Pass Pass w/ Config Pass Pass Pass/Fail Pass Pass Fail Pass Pass Pass Fail Pass Fail Pass w/ Config Pass Pass Fail Fail Fail Pass w/ Config Fail 16 Fail 11 Fail 12 Pass 4 Fail 0 Fail 3 Fail 19 Pass 29 Fail 36
  • 37.                                                                                                             Heat Maps – Phones – After Configuration Apple iPhone iOS 5 HTC Vivid Android Access Audit Integrity Authentication Transmission Access Audit Integrity Authentication Transmission Pass w/ Config Pass w/ Config Pass/Fail Fail Pass Pass w/ Config Pass Fail Fail Pass Fail Fail Pass Pass w/ Config Pass w/ Config Fail Pass w/ Config Fail Pass w/ Config Pass w/ Config Fail Fail Pass Pass w/ Config Pass w/ Config Fail Fail Fail Pass w/ Config Pass w/ Config Pass Pass Pass Fail Fail Pass Pass Fail Fail Fail Pass Fail Pass Fail Pass Pass Fail Fail Fail Pass Pass w/ Config Pass Pass/Fail Fail Pass w/ Config Fail Fail Fail Fail Pass w/ Config Fail Pass Fail Fail Pass Pass w/ Config Pass Pass Pass w/ Config Fail Pass Pass Pass Pass Fail Pass w/ Config Pass Pass Pass Pass Fail Pass Fail Fail Fail Fail 21 Fail 12 Fail 9 Pass 10 Fail 2 Pass 0 Pass 15 Pass 25 Pass w/ Config Blackberry Curve 9300 Windows Phone Access Audit Integrity Authentication Transmission Access Audit Integrity Authentication Transmission Pass w/ Config Pass Fail Pass Pass Pass w/ Config Fail Fail Fail Pass Pass w/ Config Pass Fail Pass w/ Config Fail Fail Pass w/ Config Fail Pass w/ Config Fail Fail Fail Pass w/ Config Pass w/ Config Pass w/ Config Fail Fail Fail Pass w/ Config Fail Pass Pass Pass w/ Config Fail Fail Pass Fail Pass/Fail Fail Fail Pass Fail Pass w/ Config Fail Pass Pass Fail Pass Fail Fail Pass w/ Config Fail Fail Fail Fail Fail Pass/Fail Fail Pass Fail Fail Fail Pass Fail Pass Pass w/ Config Pass Pass Pass/Fail Pass Pass Fail Pass Pass Pass Fail Pass Fail Pass w/ Config Pass Pass Fail Fail Fail Pass w/ Config Fail 16 Fail 11 Fail 12 Pass 4 Fail 0 Fail 3 Fail 19 Pass 29 Fail 37
  • 38.                                                                                                                                                                                                                                                         Heat Maps - Tablets – Default Configuration Apple iPad iOS 5 Access Audit Integrity Authentication Transmission Pass w/ Config Pass w/ Config Pass/Fail Fail Pass Fail Fail Pass Pass w/ Config Pass w/ Config Fail Fail Pass Pass w/ Config Pass w/ Config Pass Pass Pass Fail Fail Pass Fail Pass Fail Pass Pass w/ Config Pass Pass/Fail Fail Fail Pass w/ Config Fail Pass Pass w/ Config Pass Pass Pass Pass Pass Pass Pass Fail Fail 21 Fail Pass Pass Pass HP TouchPad BlackBerry Playbook Access Audit Integrity Authentication Transmission Access Audit Integrity Authentication Transmission Pass w/ Config Pass w/ Config Fail Fail Pass Pass w/ Config Fail Fail Fail Pass Fail Fail Pass Pass w/ Config Fail Fail Fail Fail Pass w/ Config Fail Fail Fail Fail Pass w/ Config Pass w/ Config Fail Fail Fail Pass w/ Config Fail Pass Pass Pass Fail Fail Pass Fail Pass Fail Fail Pass Fail Pass Fail Pass Pass Fail Fail Fail Pass Pass Fail Pass/Fail Fail Pass Pass Fail Fail Pass Fail Fail Fail Fail Fail Pass Pass w/ Config Fail Pass Pass/Fail Pass Pass Pass Pass Pass Fail Pass Pass Fail Pass w/ Config Pass Pass Pass Fail Fail Fail Pass 15 Fail 17 Pass 7 Fail 4 Pass 1 Fail 1 Fail 24 Fail 25 Pass w/ Config ViewSonic Android OS Motorola XOOM Access Audit Integrity Authentication Transmission Access Audit Integrity Authentication Transmission Fail Fail Fail Fail Pass Pass w/ Config Pass w/ Config Fail Pass w/ Config Pass Fail Fail Fail Fail Pass w/ Config Fail Pass w/ Config Fail Pass w/ Config Pass w/ Config Fail Fail Fail Fail Pass w/ Config Fail Fail Pass w/ Config Pass w/ Config Pass w/ Config Pass Pass Fail Fail Fail Pass Pass Fail Fail Fail Fail Fail Fail Fail Pass Pass Fail Fail Fail Pass Pass Fail Fail Fail Pass Fail Fail Fail Pass Fail Fail Pass Fail Fail Pass Pass w/ Config Fail Pass Pass w/ Config Pass w/ Config Pass Fail Pass w/ Config Pass Fail Pass w/ Config Fail Fail Fail Pass Fail Pass Fail Fail Fail Fail 8 Fail 12 Fail 4 Fail 13 Fail 0 Fail 0 Pass 35 Fail 22 Pass w/ Config ViewSonic Windows OS Access Pass w/ Config Pass w/ Config Pass w/ Config Pass Pass Pass 14 25 3 5 Audit Pass w/ Config Pass w/ Config Fail Pass w/ Config Pass Pass w/ Config Pass Pass Pass Pass w/ Config Integrity Pass w/ Config Pass w/ Config Pass/Fail Pass Fail Pass w/ Config Pass w/ Config Pass w/ Config Pass w/ Config Pass/Fail Fail Pass/Fail Pass w/ Config Fail Pass Pass w/ Config Authentication Pass w/ Config Pass Pass w/ Config Pass w/ Config Pass w/ Config Pass w/ Config Fail Pass Pass w/ Config Pass Transmission Pass Pass w/ Config Pass w/ Config Pass w/ Config Pass 9 2 15 Samsung Galaxy Access Pass w/ Config Fail Fail Pass Pass Pass w/ Config 11 10 0 26 Audit Pass w/ Config Fail Fail Pass Fail Fail Pass Pass Pass Pass Integrity Fail Fail Fail Fail Fail Fail Fail Pass w/ Config Fail Fail Fail Fail Fail Fail Pass Pass w/ Config Authentication Fail Pass w/ Config Pass w/ Config Fail Fail Fail Fail Fail Pass w/ Config Pass Transmission Pass Pass w/ Config Pass w/ Config Fail Pass 38
  • 39.                                                                                                                                                                                                                                                         Heat Maps - Tablets – After Configuration ViewSonic Windows OS Access Audit Integrity Authentication Transmission Pass w/ Config Pass w/ Config Pass w/ Config Pass w/ Config Pass Pass w/ Config Pass w/ Config Pass w/ Config Pass Pass w/ Config Pass w/ Config Fail Pass/Fail Pass w/ Config Pass w/ Config Pass Pass w/ Config Pass Pass w/ Config Pass w/ Config Pass Pass Fail Pass w/ Config Pass Pass Pass w/ Config Pass w/ Config Pass w/ Config Pass Pass w/ Config Fail Pass Pass w/ Config Pass Pass Pass w/ Config Pass w/ Config Pass w/ Config Pass/Fail Pass Fail Pass/Fail 14 Pass w/ Config 25 Fail 3 Pass 5 Pass w/ Config HP TouchPad Access Audit Integrity Authentication Transmission Pass w/ Config Pass w/ Config Fail Fail Pass Fail Fail Pass Pass w/ Config Fail Fail Fail Fail Pass w/ Config Pass w/ Config Pass Pass Pass Fail Fail Pass Fail Pass Fail Pass Pass Fail Pass/Fail Fail Pass Fail Fail Pass Pass w/ Config Fail Pass Pass Pass Pass Fail Pass w/ Config Fail Fail 15 Fail 7 Fail 1 Fail 24 Fail Apple iPad iOS 5 Access Audit Integrity Authentication Transmission Pass w/ Config Pass w/ Config Pass/Fail Fail Pass Fail Fail Pass Pass w/ Config Pass w/ Config Fail Fail Pass Pass w/ Config Pass w/ Config Pass Pass Pass Fail Fail Pass Fail Pass Fail Pass Pass w/ Config Pass Pass/Fail Fail Fail Pass w/ Config Fail Pass Pass w/ Config Pass Pass Pass Pass Pass Pass Pass Fail Fail 21 Fail 9 Pass 2 Pass 15 Pass BlackBerry Playbook Access Audit Integrity Authentication Transmission Pass w/ Config Fail Fail Fail Pass Fail Fail Fail Pass w/ Config Fail Fail Fail Fail Pass w/ Config Fail Pass Fail Pass Fail Fail Pass Fail Fail Fail Pass Pass Pass Fail Fail Fail Fail Fail Pass Pass/Fail Pass Pass Fail Pass Pass Pass Pass Fail Pass 17 Pass 4 Pass 1 Fail 25 Pass w/ Config ViewSonic Android OS Motorola XOOM Samsung Galaxy Access Audit Integrity Authentication Transmission Access Audit Integrity Authentication Transmission Access Audit Integrity Authentication Transmission Fail Fail Fail Fail Pass Pass w/ Config Pass w/ Config Fail Pass w/ Config Pass Pass w/ Config Pass w/ Config Fail Fail Pass Fail Fail Fail Fail Pass w/ Config Fail Pass w/ Config Fail Pass w/ Config Pass w/ Config Fail Fail Fail Pass w/ Config Pass w/ Config Fail Fail Fail Fail Pass w/ Config Fail Fail Pass w/ Config Pass w/ Config Pass w/ Config Fail Fail Fail Pass w/ Config Pass w/ Config Pass Pass Fail Fail Fail Pass Pass Fail Fail Fail Pass Pass Fail Fail Fail Fail Fail Fail Fail Pass Pass Fail Fail Fail Pass Pass Fail Fail Fail Pass Pass Fail Fail Fail Pass Fail Fail Fail Pass w/ Config Fail Fail Fail Pass Fail Fail Pass Fail Fail Pass Fail Fail Pass Pass w/ Config Fail Pass Pass w/ Config Pass w/ Config Pass Pass w/ Config Fail Pass Fail Pass w/ Config Pass Fail Pass w/ Config Pass Fail Pass w/ Config Fail Fail Fail Pass Fail Pass Pass Fail Pass Fail Fail Fail Fail Fail Fail 8 Fail 12 Fail 11 Fail 4 Fail 13 Fail 10 Fail 0 Fail 0 Pass 0 Pass 35 Fail 22 Pass w/ Config 26 Pass w/ Config 39
  • 40.                                                                                                                                                                             Heat Maps - PCs – Default Configuration HP ProBook Windows 7 HP Microtower Windows 7 Access Audit Integrity Authentication Transmission Access Audit Integrity Authentication Transmission Pass w/ Config Pass w/ Config Pass w/ Config Pass w/ Config Pass Pass w/ Config Pass w/ Config Pass w/ Config Pass w/ Config Pass Pass w/ Config Pass w/ Config Pass w/ Config Pass Pass w/ Config Pass w/ Config Pass w/ Config Pass w/ Config Pass Pass Pass w/ Config Fail Pass w/ Config Pass Pass w/ Config Pass w/ Config Fail Pass w/ Config Pass Pass Pass Pass w/ Config Pass Pass w/ Config Pass w/ Config Pass Pass w/ Config Pass Pass w/ Config Pass Pass Pass Fail Pass w/ Config Pass Pass Pass Fail Pass w/ Config Pass Pass Pass w/ Config Pass w/ Config Pass w/ Config Pass Pass w/ Config Pass w/ Config Pass w/ Config Pass Pass w/ Config Fail Pass Pass w/ Config Fail Pass Pass w/ Config Pass Pass Pass w/ Config Pass Pass Pass w/ Config Pass w/ Config Pass Pass w/ Config Pass w/ Config Pass w/ Config Pass/Fail Pass Pass w/ Config Pass/Fail Pass Fail Fail Pass w/ Config Pass w/ Config 15 Pass w/ Config 18 Pass w/ Config 26 Fail 23 Fail 1 Pass 1 Pass 5 Pass w/ Config 5 Pass w/ Config 40
  • 41.                                                                                                                                                                             Heat Maps - PCs – After Configuration HP ProBook Windows 7 HP Microtower Windows 7 Access Audit Integrity Authentication Transmission Access Audit Integrity Authentication Transmission Pass w/ Config Pass w/ Config Pass w/ Config Pass w/ Config Pass Pass w/ Config Pass w/ Config Pass w/ Config Pass w/ Config Pass Pass w/ Config Pass w/ Config Pass w/ Config Pass Pass w/ Config Pass w/ Config Pass w/ Config Pass w/ Config Pass Pass Pass w/ Config Fail Pass w/ Config Pass Pass w/ Config Pass w/ Config Fail Pass w/ Config Pass Pass Pass Pass w/ Config Pass Pass w/ Config Pass w/ Config Pass Pass w/ Config Pass Pass w/ Config Pass Pass Pass Fail Pass w/ Config Pass Pass Pass Fail Pass w/ Config Pass Pass Pass w/ Config Pass w/ Config Pass w/ Config Pass Pass w/ Config Pass w/ Config Pass w/ Config Pass Pass w/ Config Fail Pass Pass w/ Config Fail Pass Pass w/ Config Pass Pass Pass w/ Config Pass Pass Pass w/ Config Pass w/ Config Pass Pass w/ Config Pass w/ Config Pass w/ Config Pass/Fail Pass Pass w/ Config Pass/Fail Pass Fail Fail Pass w/ Config Pass w/ Config 15 Pass w/ Config 18 Pass w/ Config 26 Fail 23 Fail 1 Pass 1 Pass 5 Pass w/ Config 5 Pass w/ Config 41
  • 42. Configuration is Key • Our tests show the importance of configuration • Without configuration, none of the tested devices could achieve more than 50% of the security requirements • With ‘on-device’ configuration, 9 of the devices were able to meet more than 50% of the security requirements • With ‘on-device’ configuration, 87% was the highest score achieved among the devices 42
  • 43. Unexpected Findings • Devices without passwords/unlocked allow access to files via USB • Android security varies greatly between vendors • Blackberry PlayBook tablet runs a web server by default – Creates potential vulnerabilities • ViewSonic ViewPad 10 runs a capable Windows 7 – Same hardware runs Android with missing security features • HP TouchPad moving toward Android applications – Security implications are varied • Enterprise mobile device management tools could make devices more secure – Require additional, scarce resources 43
  • 44. Sample Lockdown Procedures • Based on the Security Requirements Traceability Matrix (RTM) • Explains: – What to do – which items need configuration – How to do it – with text and graphics • Address all results that are “Pass w/Config” • Step by step directions to “Pass” • Note: – Some of these procedures are available elsewhere, but are not specific to use in the medical ecosystem – Sources and quality vary greatly 44
  • 45. Sample Lockdown Procedures: Password Protection • Apple iPhone The first line of defense for protecting the privacy of your data on a mobile device is to enable a password. 45
  • 46. Sample Lockdown Procedures: Password Protection • Apple iPhone – On the Home Screen, select the Settings Icon. 46
  • 47. Sample Lockdown Procedures: Password Protection • Apple iPhone – Navigate through the Settings display and select General. 47
  • 48. Sample Lockdown Procedures: Password Protection • Apple iPhone – Navigate through the Settings display and select General. 48
  • 49. Sample Lockdown Procedures: Password Protection • Apple iPhone – In the General section, locate Passcode Lock and then select. 49
  • 50. Sample Lockdown Procedures: Password Protection • Apple iPhone – If the Simple Passcode is in the ON position, Slide to the OFF position. 50
  • 51. Sample Lockdown Procedures: Password Protection • Apple iPhone – If the Simple Passcode is in the ON position, slide it to the OFF position. 51
  • 52. Sample Lockdown Procedures: Password Protection • Apple iPhone – If the Simple Passcode is in the ON position, slide it to the OFF position. Next select Turn Passcode On 52
  • 53. of at Sample Lockdown Procedures: Password Protection • Apple iPhone By disabling Simple Passcode, you now can create a Complex Password. 1. Create a password/passcode at least eight (8) characters in length. 2. Use a combination of alphabetic, upper and lower case characters, numbers, and special characters. 53
  • 54. Sample Lockdown Procedures: Password Protection • Apple iPhone – Re-enter your complex password 54
  • 55. Sample Lockdown Procedures: Password Protection • Apple iPhone With password protection in place, you will now be challenged to enter your password the next time the iPhone’s Auto-Lock screen appears. • The Auto-Lock timer should not be set to greater than 3 mins. 55
  • 56. Sample Lockdown Procedures: Password Protection • Apple iPhone Your iPhone is now secured with password protection after 3 minutes of inactivity. 56
  • 57. 57 Sample Lockdown Procedures: SMS Messages • Apple iPad It is important that sensitive data is only viewed by the intended audience.
  • 58. SMS icon. 58 Sample Lockdown Procedures: SMS Messages • Apple iPad – To secure Settings messages, first Tap on the
  • 59. Settings 59 Sample Lockdown Procedures: SMS Messages • Apple iPad – Review the options under the panel and locate Notifications
  • 60. icon center to the 60 Sample Lockdown Procedures: SMS Messages • Apple iPad – right. Next select the Messages near the on the panel
  • 61. 61 Sample Lockdown Procedures: SMS Messages • Apple iPad The next view shows a variety of selections. 1. Under Alert Style, select None
  • 62. , Show selection to 62 Sample Lockdown Procedures: SMS Messages • Apple iPad 2. Slide the Preview OFF The next view shows a variety of selections. 1. Under Alert Style select None
  • 63. , Show selection to View in OFF. 63 Sample Lockdown Procedures: SMS Messages • Apple iPad The next view shows a variety of selections. 1. Under Alert Style select None 2. Slide the Preview OFF. 3. Slide the Lock Screen selection to
  • 64. settings 64 Sample Lockdown Procedures: SMS Messages • Apple iPad With the new displayed. in place, the owner of the iPad will still be alerted of new SMS messages, but phone numbers and content will not be
  • 65. 65 Sample Lockdown Procedures: Form Data • Galaxy Tab To ensure privacy, it is important that personal data and passwords are not retained by the web browser of the mobile device.
  • 66. 66 Sample Lockdown Procedures: Form Data • Galaxy Tab – Launch the internet Browser from the home screen. – Select the Menu Key icon located near the base of the unit.
  • 67. 67 Sample Lockdown Procedures: Form Data • Galaxy Tab – This will bring up the Browser Menu with a variety of options. – Tap on the Settings icon.
  • 68. 68 Sample Lockdown Procedures: Form Data • Galaxy Tab The Adjusting Browser Page Settings is now in view.
  • 69. 69 Sample Lockdown Procedures: Form Data • Galaxy Tab Uncheck the following: 1. Accept cookies
  • 70. 70 Sample Lockdown Procedures: Form Data • Galaxy Tab Uncheck the following: 1. Accept cookies 2. Remember form data
  • 71. 71 Sample Lockdown Procedures: Form Data • Galaxy Tab Uncheck the following: 1. Accept cookies 2. Remember form data 3. Enable location
  • 72. 72 Sample Lockdown Procedures: Form Data • Galaxy Tab Uncheck the following: 1. Accept cookies 2. Remember form data 3. Enable location 4. Remember passwords
  • 73. 73 Sample Lockdown Procedures: Form Data • Galaxy Tab All options should now be grey and inactive, except for Show security warnings which should remain selected with a checkmark.
  • 74. Sample Lockdown Procedures: Security Code • Windows Phone Windows mobile has a password protection feature but does not currently support Complex Passwords. The following steps will instruct an owner of a Windows mobile Smartphone to enable a numeric Security Code. 74
  • 75. Sample Lockdown Procedures: Security Code • Windows Phone – From the Start screen, Tap the Arrow icon. 75
  • 76. Sample Lockdown Procedures: Security Code • Windows Phone – In the App Menu Screen, Slide down the options till you reach the Settings icon and then select. 76
  • 77. Sample Lockdown Procedures: Security Code • Windows Phone – Scroll down to and Tap lock + wallpaper. 77
  • 78. Sample Lockdown Procedures: Security Code • Windows Phone – Scroll down to and Tap lock + wallpaper. 78
  • 79. Sample Lockdown Procedures • Windows Phone – Slide the Password toggle to enable the Security Code. 79
  • 80. Sample Lockdown Procedures • Windows Phone – Slide the Password toggle to enable the Security Code When activated, the Password toggle is highlighted Blue. 80
  • 81. Sample Lockdown Procedures • Windows Phone – Enable password: Enter and re-enter numeric codes and then tap Done. – Security guidelines recommend a minimum of 8 digits be used. 81
  • 82. Sample Lockdown Procedures • Windows Phone With Passcode protection in place, you will now be required to enter it when the Lock Screen appears after inactivity. • The Lock Screen feature should not be set to greater than 3 mins 82