Weitere ähnliche Inhalte
Ähnlich wie Enterprise Mobile Security for PeopleSoft
Ähnlich wie Enterprise Mobile Security for PeopleSoft (20)
Kürzlich hochgeladen (20)
Enterprise Mobile Security for PeopleSoft
- 1. Mobile Security for PeopleSoft
A Roadmap
1 ©GreyHeller 2012
Enterprise Mobile Security - A Roadmap
- 2. Table of Contents
Overview…………………………………………………………………………………………… 3
Authentication…………………………………………………………………………………… 4 - 6
Managing Identities on Corporate Systems………………………………………… 7
Controlling Mobile Access to Data & Processes………………………………….. 8
Protecting Application Data Stored on Devices………………………………….. 9 - 10
Device Loss or Theft…………………………………………………………………………… 11
Logging & Auditing…………………………………………………………………………….. 12
2 ©GreyHeller 2012
Enterprise Mobile Security - A Roadmap
- 3. Overview
The rapid adoption of mobile technologies is both a boon to corporate productivity and end -user
engagement and a nightmare as organizations try to keep up with the security/infrastructure
requirements. According to Forrester Research, in 2016 350 million employees will use smartphones,
200 million of which will bring their own devices to use against corporate systems.
In addition, Forrester Research contends that mobile is the flash point for a much more holistic, far-
reaching change. This means that organizations will:
Empower people by focusing on their tasks and context in their moments of decision.
Protect business value by provisioning partners with tools in their daily workflow and context.
Accelerate business decisions by putting data dashboards into executives’ hands
Control smart products from mobile devices and extend the value of products with an app
ecosystem.
In order to achieve these benefits, organizations must provide mobile access to their systems, data, and
processes while managing the security risks inherent in mobile technology:
Security/infrastructure tools to help organizations manage and administer mobile security risks
are being developed and perfected
With the advent of Bring Your Own Device (BYOD) in the enterprise, standardizati on on mobile
devices is much more problematic than for desktops or laptops
Because mobile devices aggregate personal, business, and collaboration information , security
risks are high
Implementing physical security policies with mobile devices is problematic
This white paper will examine the risks and solutions for providing mobile access to enterprise systems.
We will cover the following topics:
Authenticating users from mobile devices
Managing the user’s identity to corporate systems
Controlling mobile access to data and processes
Protecting application data
Protecting your corporate network
Dealing with the loss or theft of devices
Analyzing system activity
3 ©GreyHeller 2012
Enterprise Mobile Security - A Roadmap
- 4. Authentication
The first step to using any corporate system is authenticating the user. The authentication process
generally involves a user providing identification as well as one or more correct responses to a system
authentication challenge. Once the user has been authenticated, the system grants access to its data
and business processes based on the user’s identity/role.
When looking at the authentication process, organizations should consider the following:
Is there a consistent identity for the user across all applications he/she accesses?
Is there a need to protect against password fatigue?
Is there a need to protect against user id / password theft?
Externalizing the authentication process
The best way to protect against authentication risks is to externalize the authentication credentials from
each application accessed by an end-user. Implementing a common infrastructure for authentication
across all corporate systems allows the following:
Provide a single set of credentials that a user can remember for all corporate resources
Provide a single choke-point for shutting down access when a user is terminated
Ensuring that password controls are consistently enforced across all corporate systems
Probably the most common means of accomplishing this is to leverage the protocols in place for
managing a user’s identity on an organization’s network and using a single signon solution to allow each
system to leverage those protocols. These solutions generally
leverage Active Directory (LDAP) for the credentials, and
GreyHeller’s Single Signon
utilize protocols such as NTLM, Kerberos, and WML for
securely authenticating users with those credentials. product, used by 50+
organizations to externalize
GreyHeller believes this is best practice regardless of
whether a user is accessing from a desktop machine or a
authentication credentials from
mobile device. PeopleSoft, is foundational to
our mobile solution,
What about authenticating from outside the
PeopleMobile™.
corporate network?
Obviously, one of the most important benefits of mobile
access to corporate systems is allowing users to perform tasks regardless of their location. However,
allowing users to authenticate remotely raises the following considerations:
1. If you’re leveraging your network for a validating a user’s credentials, how do you authenticate
when the user is external to the network?
2. How can you protect against unauthorized use of somebody else’s credentials?
4 ©GreyHeller 2012
Enterprise Mobile Security - A Roadmap
- 5. External Network Validation
Historically, organizations have utilized VPN (Virtual Private Network) tunneling to allow users to
authenticate themselves to networks and access network resources. This technique works well for
workstations that need full access to all network resources. However, mobile devices do not access
network resources in the same manner as workstations. In addition, VPN clients must be specially
installed and configured for use.
Therefore, the following techniques are generally used for mobile device authentication:
Web VPN Proxies
Special-purpose Browser / Email client applications
It’s important to note that both techniques leverage server-side components that utilize common
networking protocols for authentication: NTLM, Kerberos, and WML and can leverage single signon
solutions that utilize these protocols.
Web VPN Proxies
A web VPN proxy allows a user to authenticate through a
web browser. The server performs the validation and
GreyHeller Single Signon works
passes credentials to other systems such as a proxy server.
Because the server is configured to communicate with
with Web VPN Proxy solutions
these other services and manage the process, the device for authentication outside a
does not require software to be installed or configured. corporation’s network
Common VPN proxies include Microsoft UAG and Cisco
Web VPN.
Special-purpose Browser/Email client application
Another option is to utilize a special-purpose mobile application that isolates access from other
resources on the mobile device. These applications have special logic for calling corporate servers for
authentication and managing access to corporate resources. The application would authenticate itself
to its server component, and the server would grant access to the servers and services that have been
configured. Probably the most common solution in this
category is Good Technologies’ Enterprise Server.
PeopleMobile™ works with the
From an authentication perspective, the servers would be leading enterprise
configured to leverage common networking protocols,
allowing single signon solutions to provide access to those
Browser/Email applications
systems.
5 ©GreyHeller 2012
Enterprise Mobile Security - A Roadmap
- 6. Two Factor Authentication
One technique for protecting mobile users from unauthorized use of their credentials is to require
additional authentication when accessing information from an insecure location or when accessing
sensitive information or processes. For example, it is common practice today for banks to require
additional authentication.
There are a number of ways that the additional authentication can be implemented:
Prompting for and sending a PIN for the user to enter. PIN can be sent through a number of
channels:
o SMS message
GreyHeller’s ERP Firewall
o Telephone Call
o Email software product is embedded
Pre-defining a one-time password the user into PeopleMobile™. It enforces
can provide two-factor authentication based
Tying access to device identification
on location and/or content
Utilizing a token, such as a SecureID token
requested.
Although this additional validation can be prompted
upon initial access to the system, it is best practice to prompt for the additional validation at the point in
time when the user is accessing sensitive data or processes.
6 ©GreyHeller 2012
Enterprise Mobile Security - A Roadmap
- 7. Managing User Identity on Corporate Systems
What does it mean to be a given user on a given system? This is an important question, because the
rights and privileges granted to that system are driven by this answer. Organizations typically spend
significant time and effort defining, testing, and auditing this access.
When looking at the architectures that drive mobile access, organizations must also look at the risks
related to managing users’ identities on their corporate systems.
Do users have consistent privileges across
With PeopleMobile™ and
mobile and non-mobile systems?
How are changes in privileges propagated embedded ERP Firewall, users
across mobile and non-mobile systems? have the same identity, rights,
How do organizations prove to auditors that and privileges as non-mobile
sufficient controls are enforced across mobile
systems without the need for
and non-mobile systems?
synchronization between mobile
As such, organizations must develop a comprehensive
and non-mobile systems.
strategy for managing the identity of users across mobile and non-mobile systems.
7 ©GreyHeller 2012
Enterprise Mobile Security - A Roadmap
- 8. Controlling Mobile Access to Data and Processes
In order to realize the benefits of utilizing mobile technologies, organizations, must allow access to the
data and systems that drive those processes. This doesn’t mean, however, that organizations should
provide unfettered access to all parts of these systems under all conditions.
As part of providing remote access to data and processes, organizations should consider the following
threats:
Lack of oversight of employees How do you protect your organization against unauthorized use
utilizing corporate systems by employees when they are remote? Should users have
mobile access to transactions such as entering grades or
administering payroll?
Risks related to compromised How do you protect your organization against remote,
system credentials unauthorized external parties using compromised system
credentials?
Risks related to lost or stolen How do you protect against unauthorized use compromised
mobile devices mobile devices that contain system credentials?
In order to protect against these threats, organizations
should adopt the following techniques: PeopleMobile™ with embedded
Enforcement of location-based control over
ERP Firewall meets all
access to system content requirements for controlling
Adoption of 2-factor authentication challenges remote access to data and
when the access location is questionable and/or
processes
the content accessed is sensitive
Implementation of user, location, process, and
data access logging
8 ©GreyHeller 2012
Enterprise Mobile Security - A Roadmap
- 9. Protecting Application Data Stored on Devices
As part of utilizing enterprise systems, users access data that is sensitive, confidential, and/or regulated,
including:
Financial data PeopleMobile™ protects
HIPPA; FERPA application data by not storing it
SSN on the device. PeopleMobile™
Compensation; benefits
controls access to sensitive
Pricing
Supplier Contracts
documents.
This information is provided and managed on devices in various ways, each of which requires
protection:
Delivery of Data over networks Implementing and enforcing SSL encryption of all traffic to an
organization’s servers
Caching of Application Data for Utilizing HTML5 browser-based applications for access to
performance purposes or sensitive data. Alternatively, enforcing data encryption for all
disconnected access data that is stored on mobile devices.
Storing of documents, such as Restricting access to download documents containing sensitive
PDF, word, and excel files data. Alternatively, implementing device-level capabilities for
remotely wiping or firewalling files on mobile devices
9 ©GreyHeller 2012
Enterprise Mobile Security - A Roadmap
- 10. Network Security
Mobile devices access corporate systems from the public internet or through corporate wireless
networks. As with any computing device, organizations must protect their networks against viruses and
other malware that may be resident on mobile devices.
Accessing from the public internet Proper implementation of physical and application firewalls
protects your internal network and servers.
Accessing through WIFI – Guest One technique is to provide WIFI for guest access to mobile
Access devices. Mobile devices connecting to this network would only
have access to the servers that are firewalled off from the rest
of your network.
Accessing through WIFI – Internal As with any device connecting to an internal network,
Access enforcement of virus and malware protection tools is critical for
protecting the network and servers.
Supporting Mobile Devices on your internal network
It is imperative to define the policy by which you will support these devices connecting to your network,
including:
Enforcing use of antivirus software
Not allowing access by rooted devices
Enforcing that updates on devices are consistently applied
10 ©GreyHeller 2012
Enterprise Mobile Security - A Roadmap
- 11. Loss or Theft of Device
Due to the portability of mobile devices, the loss or theft of a device merits special consideration. In
addition to the obvious risks related to corporate use of these devices, there are legal barriers related to
a corporation’s allowable actions with an employee -owned device. While it is perfectly acceptable for
an organization to wipe the memory of a device it owns, this is not the case in a “br ing your own device”
scenario.
It is imperative to adopt a comprehensive strategy
toward handling of mobile devices: PeopleMobile™ with embedded
No access by Usually, this consists of
ERP Firewall enables a tiered
Employee Owned providing employees with strategy for supporting mobile
Devices mobile devices that are
device access.
completely controlled by the
organization
Restricted access Organizations can restrict
by Employee access to mobile devices by
Owned devices location and/or type of device
to mitigate risks related to lost
or stolen devices.
Tiered access by Organizations can grant
Employee Owned different levels of security
devices depending on whether
employees opt-in to allowing
the organization to wipe the
device of its data.
11 ©GreyHeller 2012
Enterprise Mobile Security - A Roadmap
- 12. Logging and auditing
Capturing and analyzing system activity is a critical aspect of any mobile security strategy. This includes
capturing information about who is accessing what content, from what location, and the data and
processes being performed. This allows organizations to:
Proactively Analyze all attempts to access system
administer system resources, enabling organizations to find and
security counter penetration attempts.
Analyze system use for patterns that indicate PeopleMobile™
unauthorized use and adherence to policies
with embedded
Gather information Identify data to support disciplinary action for ERP Firewall
needed to take employees
action captures all
Gather information to support legal information
proceedings
needed to comply
Support Audit and Prove system integrity and adherence to
with logging and
Controls policies and controls
auditing
Document and understand scope of breaches requirements.
12 ©GreyHeller 2012
Enterprise Mobile Security - A Roadmap