SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Mobile Security for the
Enterprise
Considerations For A Robust Strategy
Will Adams
Software Architect
Fiserv, Inc.
@RemoteArchitect
Agenda
• Questions that need to be asked
• Defining a security strategy
• Risks and threats
• Authentication & Authorization
• Protecting data
• Securing communications
• Application security
• Managing devices
• Enterprise Mobility Management
• Demo
• Resources
Questions that need to be asked
• What problems are we trying to solve?
• How do we identify users?
• How do we manage what users can do?
• How do we protect our data?
• How do we enforce secure communications?
• How do we secure our apps?
• How do we manage devices?
• What are the risks and threats?
• How do we solve these problems and deliver a mobile solution
to our enterprise while mitigating the risks and threats?
Defining a security strategy
• Determine usage scenario(s) – corporate-owned devices (COD) and/or bring your
own device (BYOD)
• Least control of hardware, OS and software with BYOD
• Don’t let users do both since it’s harder to support
• Create policies to manage mobile security in the enterprise. For example:
• Set mandatory passcodes
• No rooted or jailbroken devices
• Disable copy-and-paste of business data
• Don’t store sensitive data on the device
• Always require VPN
• Wrap custom apps in a secure container
Mobile Network Management
and Security
At the Device
Mobile Device
Management and Security
Enroll
Register owner and services
Configure
Set appropriate security
policies
Monitor
Ensure device compliance
Reconfigure
Add new policies over-the-air
De-provision
Remove services and wipe
Mobile Device
Management
 Device wipe and
lockdown
 Password
management
 Configuration policy
 Compliance
Mobile
Network
Protection
 Secure
communications
(VPN)
Mobile Identity &
Access
Management
 Identity management
 Authorize and
authenticate
 Certificate
management
 Multi-factor
Mobile Threat
Management
 Antimalware
 Antispyware
 Antispam
 Firewall/IPS
 Web filtering
 Web reputation
Mobile Application
Management and Security
On the Network For the mobile app
Mobile
Information
Protection
 Data encryption
(device, file and
app)
 Mobile data loss
prevention
Mobile App
Development &
Management
 Scanning
 Authenticity
testing
 Update
enforcement
 Remote disable
Authenticate
Properly identify mobile users
Encrypt
Secure network connectivity
Monitor
Log network access and events
Control
Allow or deny access to apps
Block
Identify and stop mobile
threats
Develop
Utilize secure coding practices
Test
Identify application
vulnerabilities
Monitor
Correlate unauthorized activity
Protect
Defend against app attacks
Update
Patch old or vulnerable apps
Risks & Threats
• OWASP1 sums it up pretty well in their top 10 list:
• M1 – Improper Platform Usage
• M2 – Insecure Data Storage
• M3 – Insecure Communication
• M4 – Insecure Authentication
• M5 – Insufficient Cryptography
• M6 – Insecure Authorization
• M7 – Client Code Quality
• M8 – Code Tampering
• M9 – Reverse Engineering
• M10 – Extraneous Functionality
1Top 10 Release Candidate for 2016
Authentication
• Two-factor authentication (TFA)
• What you know – e.g. user name, password
• What you have – e.g. physical device
• Multi-factor authentication (MFA) – Includes TFA plus:
• What you are – i.e. physical characteristics like thumbprint, face, voice
• Use claims or certificate-based authentication
• Enforce a strong password policy
• Lockout after several invalid attempts
• Delay between unsuccessful attempts
• Password strength
Authentication
• Consider Single Sign On
• Most MDM vendors offer this capability, or…
• You can roll your own using OAuth – take a look at Ping Identity’s SSO dev guide:
https://developer.pingidentity.com/en/resources/napps-native-app-sso.html
Authorization
• Should be part of a company-wide strategy
• Should combine security features with content
• Look at Digital Rights Management (DRM) systems like
• Azure Rights Management - https://technet.microsoft.com/en-us/library/jj585026.aspx
• Can sync with AD on premise
• Adobe LiveCycle Policy Server
Protecting Data
• At rest
• iOS – small amounts of data in the Keychain; larger amounts of data can leverage
Apple’s File Protection mechanism or a third party container like SQLCipher
• Android – internal storage (per app) or custom content provider (app to app)
• Encrypt your data but strike a balance between key management and a good user
experience
• In transit
• Implement Perfect Forward Secrecy (PFS) which encrypts SSL traffic
• Use VPN
• Ex: Microsoft Intune can deploy VPN profiles to specific mobile OS’
• App wrappers provide encryption for data at rest and in transit
• EMM vendors provide app wrapping capabilitiy
Securing Communications
• At a solution level – use TLS 1.2 to encrypt and protect the data stream
• Example: for web-based apps we can leverage the Strict Transport Security header to
enforce HTTPS
• At an OS level – encrypt traffic using VPN
• Best of both worlds – per app VPN
• Included with iOS7+ for specific managed apps
• Third party apps like VyprVPN for Android
• Turn off non-securable networks like Bluetooth and WiFi
• Require a firewall app on the device
Application Security
• For BYOD, use a container app as a sandbox to protect company data
• Easy to install and very secure
• Limitations using non-containerized apps. Also requires tie-in to specific vendor
• Use app wrapping feature from EMM providers
• Features:
• Encryption for data at rest and in transit
• Data loss prevention
• Geo-fencing
• Requires the unsigned app binaries
• Provides better UX and security
• Digitally sign and pen test all custom apps
Managing Devices
• Again, decide on whether you want to support COD or BYOD
• Avoid rooted or jailbroken devices at all costs!
• MDM vendors provide the best security
• Enables control of device features
• Allows wiping the device remotely
• Manages the deployment of apps and certificates
• Deploys profiles for email, WiFi, VPN, etc.
• Can use Exchange Active Sync if not using MDM but there are limitations
Enterprise Mobility Management
• Includes Mobile Device Management (MDM), Mobile Application Management
(MAM), Mobile Email Management (MEM), profiles, app wrapping, etc.
• Exchange ActiveSync can provide bare-bones MDM but doesn’t manage the
entire device. Best security solution for complete device management is to
partner with a third-party vendor.
• Vendors include Good Technologies, AirWatch and MobileIron
• Can get some level of MDM via the mobile OS
• iOS has configuration profiles which can be managed with the iPhone Configuration
Utility. This gives the same device-level functionality available to MDM providers
• Android MDM is administered as a standalone app via the Device Admin API
Enterprise Mobility Management
• EMM vendors provide a number of advantages over other methods:
• Provide SaaS or on-premise deployments for central management
• Vendors use services like Appthority for verifying the reputation of third-party apps
• Provisioning corporate settings, credentials and apps
• Complying with legal requirements
• The typical user and device enrollment process:
• Creating a new user in the administration console including name and email address
• Generating an email invitation to the user created in the prior step with temporary
access credentials and instructions to install the MDM provider’s host application
• Installing the MDM provider’s host application on the device then following the steps
to register the device with the vendor
• In the administrative console, verifying the user’s device was registered
And Don’t Forget…
• Users and organizational policies also help with security
• Establish policies to protect against theft, loss, etc.
• Educate users about the risks
Demo
• Using Microsoft Intune
Resources
• Books
• The Mobile Application Hacker’s Handbook by Dominic Chell, et al
http://www.wiley.com/WileyCDA/WileyTitle/productCd-1118958500.html
• Mobile Device Security for Dummies by Rich Campagna, et al
http://www.dummies.com/store/product/Mobile-Device-Security-For-Dummies.productCd-
0470927534,navId-322496.html
• Enterprise Mobility Management by Jack Madden
http://www.amazon.com/Enterprise-Mobility-Management-Everything-Edition-
ebook/dp/B00DK2GHHA
• Mobile Strategy How Your Company Can Win by Embracing Mobile Technologies by Dirk
Nicol
http://www.ibmpressbooks.com/store/mobile-strategy-how-your-company-can-win-by-
embracing-9780133094961
Resources
• PluralSight Course
• Enterprise Strength Mobile Device Security -
https://app.pluralsight.com/library/courses/enterprise-strength-mobile-device-
security/table-of-contents
• Websites
• Mobile Security Wiki - https://mobilesecuritywiki.com/
• OWASP Mobile Security Project -
https://www.owasp.org/index.php/OWASP_Mobile_Security_Project

Weitere ähnliche Inhalte

Was ist angesagt?

Two factor authentication presentation mcit
Two factor authentication presentation mcitTwo factor authentication presentation mcit
Two factor authentication presentation mcit
mmubashirkhan
 
2 factor authentication 3 [compatibility mode]
2 factor authentication 3 [compatibility mode]2 factor authentication 3 [compatibility mode]
2 factor authentication 3 [compatibility mode]
Hai Nguyen
 
2FA Advanced Authentication for Public Safety
2FA  Advanced Authentication for Public Safety2FA  Advanced Authentication for Public Safety
2FA Advanced Authentication for Public Safety
2FA, Inc.
 
Stronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsStronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise Applications
Ramesh Nagappan
 
Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)
Ali Raw
 

Was ist angesagt? (20)

Two factor authentication presentation mcit
Two factor authentication presentation mcitTwo factor authentication presentation mcit
Two factor authentication presentation mcit
 
Two-factor Authentication
Two-factor AuthenticationTwo-factor Authentication
Two-factor Authentication
 
Password Problem - Solved!
Password Problem - Solved!Password Problem - Solved!
Password Problem - Solved!
 
2 factor authentication 3 [compatibility mode]
2 factor authentication 3 [compatibility mode]2 factor authentication 3 [compatibility mode]
2 factor authentication 3 [compatibility mode]
 
Multifactor Authentication
Multifactor AuthenticationMultifactor Authentication
Multifactor Authentication
 
HYPR: The Leading Provider of True Passwordless Security®
HYPR: The Leading Provider of True Passwordless Security®HYPR: The Leading Provider of True Passwordless Security®
HYPR: The Leading Provider of True Passwordless Security®
 
The Zero Trust Model of Information Security
The Zero Trust Model of Information Security The Zero Trust Model of Information Security
The Zero Trust Model of Information Security
 
IoT/M2M Security
IoT/M2M SecurityIoT/M2M Security
IoT/M2M Security
 
Identity-Defined Privacay & Security for Internet of Things
Identity-Defined Privacay & Security for Internet of ThingsIdentity-Defined Privacay & Security for Internet of Things
Identity-Defined Privacay & Security for Internet of Things
 
2FA Advanced Authentication for Public Safety
2FA  Advanced Authentication for Public Safety2FA  Advanced Authentication for Public Safety
2FA Advanced Authentication for Public Safety
 
Webinar - Easy multi factor authentication strategies and PCI DSS
Webinar - Easy multi factor authentication strategies and PCI DSSWebinar - Easy multi factor authentication strategies and PCI DSS
Webinar - Easy multi factor authentication strategies and PCI DSS
 
Office 365 Security Features That Nonprofits Should Know and Use
Office 365 Security Features That Nonprofits Should Know and UseOffice 365 Security Features That Nonprofits Should Know and Use
Office 365 Security Features That Nonprofits Should Know and Use
 
Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017
 
BYOD / Mobile-Device Security Guidelines for CxO's
BYOD / Mobile-Device Security Guidelines for CxO'sBYOD / Mobile-Device Security Guidelines for CxO's
BYOD / Mobile-Device Security Guidelines for CxO's
 
Stronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise ApplicationsStronger/Multi-factor Authentication for Enterprise Applications
Stronger/Multi-factor Authentication for Enterprise Applications
 
SolusDeck
SolusDeckSolusDeck
SolusDeck
 
Mobile Apps and Security Attacks: An Introduction
Mobile Apps and Security Attacks: An IntroductionMobile Apps and Security Attacks: An Introduction
Mobile Apps and Security Attacks: An Introduction
 
Information Risk and Protection
Information Risk and ProtectionInformation Risk and Protection
Information Risk and Protection
 
Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)Authentication(pswrd,token,certificate,biometric)
Authentication(pswrd,token,certificate,biometric)
 
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest LinkSecuring Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
 

Ähnlich wie Mobile Security for the Enterprise

Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanEmpower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
David J Rosenthal
 
Security testing of mobile applications
Security testing of mobile applicationsSecurity testing of mobile applications
Security testing of mobile applications
GTestClub
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
Lenin Aboagye
 

Ähnlich wie Mobile Security for the Enterprise (20)

Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Reference Security Architecture for Mobility- Insurance
Reference Security Architecture for Mobility- InsuranceReference Security Architecture for Mobility- Insurance
Reference Security Architecture for Mobility- Insurance
 
MMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itMMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure it
 
WSO2 Enterprise Mobility Manager - 2.0
WSO2 Enterprise Mobility Manager - 2.0WSO2 Enterprise Mobility Manager - 2.0
WSO2 Enterprise Mobility Manager - 2.0
 
Appsecurity, win or loose
Appsecurity, win or looseAppsecurity, win or loose
Appsecurity, win or loose
 
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
Xylos Clients Day - Public cloud and security go hand in hand, if you approac...
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
 
Mobile Security
Mobile Security Mobile Security
Mobile Security
 
Airwatch od VMware
Airwatch od VMwareAirwatch od VMware
Airwatch od VMware
 
Computer Security.pptx
Computer Security.pptxComputer Security.pptx
Computer Security.pptx
 
Security Beyond the Firewall
Security Beyond the FirewallSecurity Beyond the Firewall
Security Beyond the Firewall
 
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanEmpower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Security testing of mobile applications
Security testing of mobile applicationsSecurity testing of mobile applications
Security testing of mobile applications
 
Primendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suitePrimendi Pilveseminar - Enterprise Mobility suite
Primendi Pilveseminar - Enterprise Mobility suite
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Mobile application securitry risks ISACA Silicon Valley 2012
Mobile application securitry risks ISACA Silicon Valley 2012Mobile application securitry risks ISACA Silicon Valley 2012
Mobile application securitry risks ISACA Silicon Valley 2012
 
Gestión de identidad
Gestión de identidadGestión de identidad
Gestión de identidad
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
 

Kürzlich hochgeladen

%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
masabamasaba
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
masabamasaba
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
masabamasaba
 

Kürzlich hochgeladen (20)

%in Durban+277-882-255-28 abortion pills for sale in Durban
%in Durban+277-882-255-28 abortion pills for sale in Durban%in Durban+277-882-255-28 abortion pills for sale in Durban
%in Durban+277-882-255-28 abortion pills for sale in Durban
 
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Vancouver Psychic Readings, Attraction spells,Br...
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
SHRMPro HRMS Software Solutions Presentation
SHRMPro HRMS Software Solutions PresentationSHRMPro HRMS Software Solutions Presentation
SHRMPro HRMS Software Solutions Presentation
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdf
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 

Mobile Security for the Enterprise

  • 1. Mobile Security for the Enterprise Considerations For A Robust Strategy Will Adams Software Architect Fiserv, Inc. @RemoteArchitect
  • 2. Agenda • Questions that need to be asked • Defining a security strategy • Risks and threats • Authentication & Authorization • Protecting data • Securing communications • Application security • Managing devices • Enterprise Mobility Management • Demo • Resources
  • 3. Questions that need to be asked • What problems are we trying to solve? • How do we identify users? • How do we manage what users can do? • How do we protect our data? • How do we enforce secure communications? • How do we secure our apps? • How do we manage devices? • What are the risks and threats? • How do we solve these problems and deliver a mobile solution to our enterprise while mitigating the risks and threats?
  • 4. Defining a security strategy • Determine usage scenario(s) – corporate-owned devices (COD) and/or bring your own device (BYOD) • Least control of hardware, OS and software with BYOD • Don’t let users do both since it’s harder to support • Create policies to manage mobile security in the enterprise. For example: • Set mandatory passcodes • No rooted or jailbroken devices • Disable copy-and-paste of business data • Don’t store sensitive data on the device • Always require VPN • Wrap custom apps in a secure container
  • 5. Mobile Network Management and Security At the Device Mobile Device Management and Security Enroll Register owner and services Configure Set appropriate security policies Monitor Ensure device compliance Reconfigure Add new policies over-the-air De-provision Remove services and wipe Mobile Device Management  Device wipe and lockdown  Password management  Configuration policy  Compliance Mobile Network Protection  Secure communications (VPN) Mobile Identity & Access Management  Identity management  Authorize and authenticate  Certificate management  Multi-factor Mobile Threat Management  Antimalware  Antispyware  Antispam  Firewall/IPS  Web filtering  Web reputation Mobile Application Management and Security On the Network For the mobile app Mobile Information Protection  Data encryption (device, file and app)  Mobile data loss prevention Mobile App Development & Management  Scanning  Authenticity testing  Update enforcement  Remote disable Authenticate Properly identify mobile users Encrypt Secure network connectivity Monitor Log network access and events Control Allow or deny access to apps Block Identify and stop mobile threats Develop Utilize secure coding practices Test Identify application vulnerabilities Monitor Correlate unauthorized activity Protect Defend against app attacks Update Patch old or vulnerable apps
  • 6. Risks & Threats • OWASP1 sums it up pretty well in their top 10 list: • M1 – Improper Platform Usage • M2 – Insecure Data Storage • M3 – Insecure Communication • M4 – Insecure Authentication • M5 – Insufficient Cryptography • M6 – Insecure Authorization • M7 – Client Code Quality • M8 – Code Tampering • M9 – Reverse Engineering • M10 – Extraneous Functionality 1Top 10 Release Candidate for 2016
  • 7. Authentication • Two-factor authentication (TFA) • What you know – e.g. user name, password • What you have – e.g. physical device • Multi-factor authentication (MFA) – Includes TFA plus: • What you are – i.e. physical characteristics like thumbprint, face, voice • Use claims or certificate-based authentication • Enforce a strong password policy • Lockout after several invalid attempts • Delay between unsuccessful attempts • Password strength
  • 8. Authentication • Consider Single Sign On • Most MDM vendors offer this capability, or… • You can roll your own using OAuth – take a look at Ping Identity’s SSO dev guide: https://developer.pingidentity.com/en/resources/napps-native-app-sso.html
  • 9. Authorization • Should be part of a company-wide strategy • Should combine security features with content • Look at Digital Rights Management (DRM) systems like • Azure Rights Management - https://technet.microsoft.com/en-us/library/jj585026.aspx • Can sync with AD on premise • Adobe LiveCycle Policy Server
  • 10. Protecting Data • At rest • iOS – small amounts of data in the Keychain; larger amounts of data can leverage Apple’s File Protection mechanism or a third party container like SQLCipher • Android – internal storage (per app) or custom content provider (app to app) • Encrypt your data but strike a balance between key management and a good user experience • In transit • Implement Perfect Forward Secrecy (PFS) which encrypts SSL traffic • Use VPN • Ex: Microsoft Intune can deploy VPN profiles to specific mobile OS’ • App wrappers provide encryption for data at rest and in transit • EMM vendors provide app wrapping capabilitiy
  • 11. Securing Communications • At a solution level – use TLS 1.2 to encrypt and protect the data stream • Example: for web-based apps we can leverage the Strict Transport Security header to enforce HTTPS • At an OS level – encrypt traffic using VPN • Best of both worlds – per app VPN • Included with iOS7+ for specific managed apps • Third party apps like VyprVPN for Android • Turn off non-securable networks like Bluetooth and WiFi • Require a firewall app on the device
  • 12. Application Security • For BYOD, use a container app as a sandbox to protect company data • Easy to install and very secure • Limitations using non-containerized apps. Also requires tie-in to specific vendor • Use app wrapping feature from EMM providers • Features: • Encryption for data at rest and in transit • Data loss prevention • Geo-fencing • Requires the unsigned app binaries • Provides better UX and security • Digitally sign and pen test all custom apps
  • 13. Managing Devices • Again, decide on whether you want to support COD or BYOD • Avoid rooted or jailbroken devices at all costs! • MDM vendors provide the best security • Enables control of device features • Allows wiping the device remotely • Manages the deployment of apps and certificates • Deploys profiles for email, WiFi, VPN, etc. • Can use Exchange Active Sync if not using MDM but there are limitations
  • 14. Enterprise Mobility Management • Includes Mobile Device Management (MDM), Mobile Application Management (MAM), Mobile Email Management (MEM), profiles, app wrapping, etc. • Exchange ActiveSync can provide bare-bones MDM but doesn’t manage the entire device. Best security solution for complete device management is to partner with a third-party vendor. • Vendors include Good Technologies, AirWatch and MobileIron • Can get some level of MDM via the mobile OS • iOS has configuration profiles which can be managed with the iPhone Configuration Utility. This gives the same device-level functionality available to MDM providers • Android MDM is administered as a standalone app via the Device Admin API
  • 15. Enterprise Mobility Management • EMM vendors provide a number of advantages over other methods: • Provide SaaS or on-premise deployments for central management • Vendors use services like Appthority for verifying the reputation of third-party apps • Provisioning corporate settings, credentials and apps • Complying with legal requirements • The typical user and device enrollment process: • Creating a new user in the administration console including name and email address • Generating an email invitation to the user created in the prior step with temporary access credentials and instructions to install the MDM provider’s host application • Installing the MDM provider’s host application on the device then following the steps to register the device with the vendor • In the administrative console, verifying the user’s device was registered
  • 16. And Don’t Forget… • Users and organizational policies also help with security • Establish policies to protect against theft, loss, etc. • Educate users about the risks
  • 18. Resources • Books • The Mobile Application Hacker’s Handbook by Dominic Chell, et al http://www.wiley.com/WileyCDA/WileyTitle/productCd-1118958500.html • Mobile Device Security for Dummies by Rich Campagna, et al http://www.dummies.com/store/product/Mobile-Device-Security-For-Dummies.productCd- 0470927534,navId-322496.html • Enterprise Mobility Management by Jack Madden http://www.amazon.com/Enterprise-Mobility-Management-Everything-Edition- ebook/dp/B00DK2GHHA • Mobile Strategy How Your Company Can Win by Embracing Mobile Technologies by Dirk Nicol http://www.ibmpressbooks.com/store/mobile-strategy-how-your-company-can-win-by- embracing-9780133094961
  • 19. Resources • PluralSight Course • Enterprise Strength Mobile Device Security - https://app.pluralsight.com/library/courses/enterprise-strength-mobile-device- security/table-of-contents • Websites • Mobile Security Wiki - https://mobilesecuritywiki.com/ • OWASP Mobile Security Project - https://www.owasp.org/index.php/OWASP_Mobile_Security_Project

Hinweis der Redaktion

  1. Elements of mobile security and management strategy from the book Mobile Strategy How Your Company Can Win by Embracing Mobile Technologies by Dirk Nicol.
  2. https://www.owasp.org/index.php/Mobile_Top_10_2016-Top_10
  3. Can also supplement authentication with time-based one-time password (TOTP) or one-time password (OTP). For example, with VPN access. TOTP/OTP can be used with TFA. Refer to: https://en.wikipedia.org/wiki/Time-based_One-time_Password_Algorithm.
  4. Remember that insecure data storage is an OWASP top 10 mobile security risk. https://www.owasp.org/index.php/IOS_Developer_Cheat_Sheet http://developer.android.com/training/articles/security-tips.html https://en.wikipedia.org/wiki/Forward_secrecy
  5. Non-containerized apps – ex: apps that open attachments.
  6. Jailbroken devices circumvent all OS security mechanisms. MDM vendors also provide device enrollment, complete or enterprise wipe, etc. http://searchmobilecomputing.techtarget.com/tip/Using-Microsoft-Exchange-ActiveSync-for-MDM-What-you-can-and-cant-do
  7. Establish hotline, support ticket system, email address for incidents, etc.