SlideShare ist ein Scribd-Unternehmen logo
1 von 35
Downloaden Sie, um offline zu lesen
ANDROID SECURITY
an Enterprise Perspective
Pietro Maggi
EMEA SW Consultant Sales Engineer
Pietro
I like to take things apart to
understand how they works
Zebra Spotlight
R&D spend
10%+
of Sales
~$3.65B
Global Sales
~7,000
Employees
Worldwide
4,500+
US & Int’l
Patents Issued
and Pending
Is Android secure?
http://www.techrepublic.com/blog/it-security/androids-very-real-master-key-vulnerability/
http://www.bbc.com/news/technology-28544443
https://www.forbes.com/sites/thomasbrewster/2015/07/27/android-text-attacks/
Using Data to Monitor Risk: Exploits
Vulnerability Initial Claim Headline Unique APKs
Peak exploitation after
public release (per
install)
Exploitation before
public release
(absolute)
Master Key
99% of devices
vulnerable
1231 < 8 in a million 0
FakeID
82% of Android users at
risk
258 <1 in a million 0
Stagefright
95% of devices
vulnerable
N/A None confirmed N/A
Source: Google Safety Net Data; Masterkey data collected from 11/15/2012 to 8/15/2013 and previously published at VirusBulletin 2013. Fake ID data collected data collected
from 11/15/2012 to 12/11/2014 and previously published at the RSA Conference 2015. Stagefright data current through May 2016.
https://arstechnica.com/security/2016/10/android-phones-rooted-by-most-serious-linux-escalation-bug-ever/
https://source.android.com/security/bulletin/2016-11-01.html
Overall…
For a device to be affected, a user must download and install a PHA that takes
advantage of one of the vulnerabilities.
Using a Device Policy Controller or other lock-down systems is a very good idea
for COSU devices.
Google’s role in Android
ecosystem security
Marshmallow
Device Owner APIs for COSU
Polish for BYOD
Nougat
Addressed Customer feedback
Boosted security and control for IT admin
Polish and control for the user
Lollipop
Separate managed work profile
and private user profile for BYOD
Device Owner for corp-liable
devices
Google Security Services
Google Play
Android SDK
Google services / APIs
Security best practices
Security improvement program
Applications
Applications updates
AOSP
CTS/CDD
Security updates
Security best practices
Device with Android OS
Security OTAs
Google
Application
Developers
Device Makers
Users
https://source.android.com/security/
Robust
Platform
Comprehensive
Services
Ecosystem
Updates
1 2 3
Android OS Offers Complete Platform Security
1
Application Isolation
Sandboxes & Permissions
SELinux
TrustZone Services
Seccomp
Isolated Process
1
Device Integrity
Hardware Root
Verified Boot
Data Encryption
Security Services
Smart Lock
1
Exploit Mitigation
NX
ASLR
Fortify Source
Updateable WebView
Integer Overflows
Hardened Media Server
1
Management
Profiles
Administrative APIs
Security Integration
(VPN, etc.)
New or substantially changed since Android 5.0
Constant, Independent Verification
11g.co/AndroidSecurityRewards
Hundreds of active
researchers
Over $1 million paid in
last 12 months
Robust
Platform
Comprehensive
Services
Ecosystem
Updates
1 2 3
Verify Apps
SafetyNet: Complete Security Services for Android
Sensor Network
Android
Device
Manager
APIS
Architecture: Google’s Safety Net for Android
Knowledge
PHA or Not
Data
App installs
Install Source
Application Analysis
Static
Dynamic
Reputation
Etc.
Other Google
Services
Search
Drive
Ads
Etc.
SafetyNet
Analysis
Exploit Detection
ACE
SIC
Etc.
Android
App Sandbox
Verified Boot
Encryption
Etc.
Chrome
Smart Lock
Device Manager
Safe Browsing
SafetyNet
Verify Apps
Install Apps
Apps
Knowledge
PHA or not
Best practices
Knowledge
PHA or not
Apps
Knowledge
Risk Signal
Data
Rare Apps
App Install Checks
Attest API
Protections
Warnings
Configuration changes
Etc
Device Data
Events
Measurements
Configurations
Etc.
Google Play
App X App Y
App Z
2 billion
devices protected
1+ billion
device scans per day
50+ billion
apps checked per day
Potentially Harmful Application Rates Since 2014
1
Potentially Harmful Application Rates Since 2014
1
Robust
Platform
Comprehensive
Services
Ecosystem
Updates
1 2 3
Ecosystem Wide Updates
Google
Application
Developers
Device Makers
Application Security Improvements
11
Zebra’s role in Android
devices security
Zebra Security – 3 Key Paradigms
Build on a
solid
foundation
Android
Enterprise
Focus on
the task
EMM, Kiosk
Security Life
Cycle
Management
LIFEGUARD
FOR
ANDROID
Zebra Extended Life Cycle Security Support
HOW TO SECURE
ENTERPRISE PLATFORMS?
Enterprise Demand
New OS Platforms
1
Consumer Market
Adoption is required
2
Successful Consumer OS
Will Be Aggressively Attacked
3
30 Day / Quarterly Security Patch Updates
Zebra Extended Life Cycle Security Support
HOW DO I STAY SECURE MEETING MY
TOTAL COST OF OWNERSHIP GOALS?
Consumer Operating Systems
Have limited security support life
1
Security Patches 2+ Years Beyond End-of-Sale
Enterprise Customers keep
devices in services for 5yrs or more.
2
Zebra Extended Life Cycle Security Support
HOW DO I STAY SECURE
DURING OS UPDATES?
Security OS Transition Period (OTP)
Consumer Operating Systems
Have limited security support life
1
Enterprise Customers keep
devices in services for 5yrs or more.
2
Zebra Extended Life Cycle Security Support
Zebra vs Consumer
Typical Consumer Zebra
Device Life Cycle
Device Avail for Sale No commit, <2yrs 3, 4 or 5yrs
Post End of Ship Service None
Additional
3, 4 or 5yrs
Typical Customer Device Refresh 24-29 months* 3-7yrs +
Security Life
Cycle
30 Days Security Updates Some Vendors Yes1
Security Patch Level Indication Yes (M+) Yes (M+)
Update Duration from First Ship 36 months / 40 months *60 months / 84months
OS Transition Period None 12 months
Extended OS Transition Period None Available ($)
1 Security Updates released every quarter during the extended life cycle
Source: USA Department of Homeland Security: Study on Mobile Device Security: link
The most important defense against mobile device security threats is to
ensure devices are patched against publicly known security
vulnerabilities and are running the most recent operating system version.
Installation of patches ensures that devices cannot be trivially targeted
with well- known public exploits, but rather an attacker must invest time,
resources, and risk of detection into developing more sophisticated
attack methods. Running the most recent operating system ensures
devices are benefiting from general security architecture improvements
that provide resilience against vulnerabilities that may not yet be publicly
known.
References
• Android security bulletins:
https://source.android.com/security/bulletin/index.html
• Android Security 2016 Year in Review:
https://security.googleblog.com/2017/03/diverse-protections-for-diverse.html
• LifeGuard for Android:
https://www.zebra.com/us/en/products/software/mobile-computers/lifeguard.html
• USA Department of Homeland Security: Study on Mobile Device Security:
https://www.dhs.gov/sites/default/files/publications/DHS%20Study%20on%20Mobile
%20Device%20Security%20-%20April%202017-FINAL.pdf
• Google’s Best Practices for Security and Privacy
https://developer.android.com/training/best-security.html
THANK YOU

Weitere ähnliche Inhalte

Was ist angesagt?

Analysis and research of system security based on android
Analysis and research of system security based on androidAnalysis and research of system security based on android
Analysis and research of system security based on androidRavishankar Kumar
 
Sperasoft talks: Android Security Threats
Sperasoft talks: Android Security ThreatsSperasoft talks: Android Security Threats
Sperasoft talks: Android Security ThreatsSperasoft
 
Android security
Android securityAndroid security
Android securityMobile Rtpl
 
Android security in depth
Android security in depthAndroid security in depth
Android security in depthSander Alberink
 
2015.04.24 Updated > Android Security Development - Part 1: App Development
2015.04.24 Updated > Android Security Development - Part 1: App Development 2015.04.24 Updated > Android Security Development - Part 1: App Development
2015.04.24 Updated > Android Security Development - Part 1: App Development Cheng-Yi Yu
 
Android Security Development
Android Security DevelopmentAndroid Security Development
Android Security Developmenthackstuff
 
Deep Dive Into Android Security
Deep Dive Into Android SecurityDeep Dive Into Android Security
Deep Dive Into Android SecurityMarakana Inc.
 
Secure SDLC in mobile software development.
Secure SDLC in mobile software development.Secure SDLC in mobile software development.
Secure SDLC in mobile software development.Mykhailo Antonishyn
 
Consulthink @ GDG Meets U - L'Aquila2014 - Codelab: Android Security -Il ke...
Consulthink @ GDG Meets U -  L'Aquila2014  - Codelab: Android Security -Il ke...Consulthink @ GDG Meets U -  L'Aquila2014  - Codelab: Android Security -Il ke...
Consulthink @ GDG Meets U - L'Aquila2014 - Codelab: Android Security -Il ke...Consulthinkspa
 
Permission in Android Security: Threats and solution
Permission in Android Security: Threats and solutionPermission in Android Security: Threats and solution
Permission in Android Security: Threats and solutionTandhy Simanjuntak
 
Understanding android security model
Understanding android security modelUnderstanding android security model
Understanding android security modelPragati Rai
 
Android Device Hardening
Android Device HardeningAndroid Device Hardening
Android Device Hardeninganupriti
 
[Wroclaw #1] Android Security Workshop
[Wroclaw #1] Android Security Workshop[Wroclaw #1] Android Security Workshop
[Wroclaw #1] Android Security WorkshopOWASP
 
Understanding Android Security
Understanding Android SecurityUnderstanding Android Security
Understanding Android SecurityAsanka Dilruk
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Securitycclark_isec
 
IBM Rational AppScan Product Overview
IBM Rational AppScan Product OverviewIBM Rational AppScan Product Overview
IBM Rational AppScan Product OverviewAshish Patel
 
Security Testing Mobile Applications
Security Testing Mobile ApplicationsSecurity Testing Mobile Applications
Security Testing Mobile ApplicationsDenim Group
 
Security threats in Android OS + App Permissions
Security threats in Android OS + App PermissionsSecurity threats in Android OS + App Permissions
Security threats in Android OS + App PermissionsHariharan Ganesan
 

Was ist angesagt? (20)

Analysis and research of system security based on android
Analysis and research of system security based on androidAnalysis and research of system security based on android
Analysis and research of system security based on android
 
Android Security
Android SecurityAndroid Security
Android Security
 
Sperasoft talks: Android Security Threats
Sperasoft talks: Android Security ThreatsSperasoft talks: Android Security Threats
Sperasoft talks: Android Security Threats
 
Android security
Android securityAndroid security
Android security
 
Android sandbox
Android sandboxAndroid sandbox
Android sandbox
 
Android security in depth
Android security in depthAndroid security in depth
Android security in depth
 
2015.04.24 Updated > Android Security Development - Part 1: App Development
2015.04.24 Updated > Android Security Development - Part 1: App Development 2015.04.24 Updated > Android Security Development - Part 1: App Development
2015.04.24 Updated > Android Security Development - Part 1: App Development
 
Android Security Development
Android Security DevelopmentAndroid Security Development
Android Security Development
 
Deep Dive Into Android Security
Deep Dive Into Android SecurityDeep Dive Into Android Security
Deep Dive Into Android Security
 
Secure SDLC in mobile software development.
Secure SDLC in mobile software development.Secure SDLC in mobile software development.
Secure SDLC in mobile software development.
 
Consulthink @ GDG Meets U - L'Aquila2014 - Codelab: Android Security -Il ke...
Consulthink @ GDG Meets U -  L'Aquila2014  - Codelab: Android Security -Il ke...Consulthink @ GDG Meets U -  L'Aquila2014  - Codelab: Android Security -Il ke...
Consulthink @ GDG Meets U - L'Aquila2014 - Codelab: Android Security -Il ke...
 
Permission in Android Security: Threats and solution
Permission in Android Security: Threats and solutionPermission in Android Security: Threats and solution
Permission in Android Security: Threats and solution
 
Understanding android security model
Understanding android security modelUnderstanding android security model
Understanding android security model
 
Android Device Hardening
Android Device HardeningAndroid Device Hardening
Android Device Hardening
 
[Wroclaw #1] Android Security Workshop
[Wroclaw #1] Android Security Workshop[Wroclaw #1] Android Security Workshop
[Wroclaw #1] Android Security Workshop
 
Understanding Android Security
Understanding Android SecurityUnderstanding Android Security
Understanding Android Security
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
IBM Rational AppScan Product Overview
IBM Rational AppScan Product OverviewIBM Rational AppScan Product Overview
IBM Rational AppScan Product Overview
 
Security Testing Mobile Applications
Security Testing Mobile ApplicationsSecurity Testing Mobile Applications
Security Testing Mobile Applications
 
Security threats in Android OS + App Permissions
Security threats in Android OS + App PermissionsSecurity threats in Android OS + App Permissions
Security threats in Android OS + App Permissions
 

Ähnlich wie Android security - an enterprise perspective

Building an Android Scale Incident Response Process
Building an Android Scale Incident Response ProcessBuilding an Android Scale Incident Response Process
Building an Android Scale Incident Response ProcessPriyanka Aash
 
Android App Security Solution
Android App Security SolutionAndroid App Security Solution
Android App Security SolutionJay Li
 
Google Android Security 2014 Report
Google Android Security 2014 ReportGoogle Android Security 2014 Report
Google Android Security 2014 ReportRonen Mendezitsky
 
PRIV Security: How BlackBerry PRIV Safeguards Your Data
PRIV Security: How BlackBerry PRIV Safeguards Your DataPRIV Security: How BlackBerry PRIV Safeguards Your Data
PRIV Security: How BlackBerry PRIV Safeguards Your DataBlackBerry
 
AMI Security 101 - Smart Grid Security East 2011
AMI Security 101 - Smart Grid Security East 2011AMI Security 101 - Smart Grid Security East 2011
AMI Security 101 - Smart Grid Security East 2011dma1965
 
Google android security_2015_report_final
Google android security_2015_report_finalGoogle android security_2015_report_final
Google android security_2015_report_finalAndrey Apuhtin
 
Secure Software Development Lifecycle
Secure Software Development LifecycleSecure Software Development Lifecycle
Secure Software Development Lifecycle1&1
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protectionxband
 
MIT-6-determina-vps.ppt
MIT-6-determina-vps.pptMIT-6-determina-vps.ppt
MIT-6-determina-vps.pptwebhostingguy
 
Transforming Risky Mobile Apps into Self Defending Apps
Transforming Risky Mobile Apps into Self Defending AppsTransforming Risky Mobile Apps into Self Defending Apps
Transforming Risky Mobile Apps into Self Defending AppsBlueboxer2014
 
IRJET- Cross Platform Penetration Testing Suite
IRJET-  	  Cross Platform Penetration Testing SuiteIRJET-  	  Cross Platform Penetration Testing Suite
IRJET- Cross Platform Penetration Testing SuiteIRJET Journal
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint SecurityBurak DAYIOGLU
 
Android Security: A Survey of Security Issues and Defenses
Android Security: A Survey of Security Issues and DefensesAndroid Security: A Survey of Security Issues and Defenses
Android Security: A Survey of Security Issues and DefensesIRJET Journal
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Scalar Decisions
 
Secure Android Apps- nVisium Security
Secure Android Apps- nVisium SecuritySecure Android Apps- nVisium Security
Secure Android Apps- nVisium SecurityJack Mannino
 
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017Jermund Ottermo
 
Google android security_2018_report
Google android security_2018_reportGoogle android security_2018_report
Google android security_2018_reportmalvvv
 
Web Application Testing for Today’s Biggest and Emerging Threats
Web Application Testing for Today’s Biggest and Emerging ThreatsWeb Application Testing for Today’s Biggest and Emerging Threats
Web Application Testing for Today’s Biggest and Emerging ThreatsAlan Kan
 
It's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityIt's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityLumension
 

Ähnlich wie Android security - an enterprise perspective (20)

Building an Android Scale Incident Response Process
Building an Android Scale Incident Response ProcessBuilding an Android Scale Incident Response Process
Building an Android Scale Incident Response Process
 
Android App Security Solution
Android App Security SolutionAndroid App Security Solution
Android App Security Solution
 
Google Android Security 2014 Report
Google Android Security 2014 ReportGoogle Android Security 2014 Report
Google Android Security 2014 Report
 
PRIV Security: How BlackBerry PRIV Safeguards Your Data
PRIV Security: How BlackBerry PRIV Safeguards Your DataPRIV Security: How BlackBerry PRIV Safeguards Your Data
PRIV Security: How BlackBerry PRIV Safeguards Your Data
 
AMI Security 101 - Smart Grid Security East 2011
AMI Security 101 - Smart Grid Security East 2011AMI Security 101 - Smart Grid Security East 2011
AMI Security 101 - Smart Grid Security East 2011
 
Google android security_2015_report_final
Google android security_2015_report_finalGoogle android security_2015_report_final
Google android security_2015_report_final
 
Secure Software Development Lifecycle
Secure Software Development LifecycleSecure Software Development Lifecycle
Secure Software Development Lifecycle
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
MIT-6-determina-vps.ppt
MIT-6-determina-vps.pptMIT-6-determina-vps.ppt
MIT-6-determina-vps.ppt
 
Transforming Risky Mobile Apps into Self Defending Apps
Transforming Risky Mobile Apps into Self Defending AppsTransforming Risky Mobile Apps into Self Defending Apps
Transforming Risky Mobile Apps into Self Defending Apps
 
IRJET- Cross Platform Penetration Testing Suite
IRJET-  	  Cross Platform Penetration Testing SuiteIRJET-  	  Cross Platform Penetration Testing Suite
IRJET- Cross Platform Penetration Testing Suite
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint Security
 
Android Security: A Survey of Security Issues and Defenses
Android Security: A Survey of Security Issues and DefensesAndroid Security: A Survey of Security Issues and Defenses
Android Security: A Survey of Security Issues and Defenses
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
 
Secure Android Apps- nVisium Security
Secure Android Apps- nVisium SecuritySecure Android Apps- nVisium Security
Secure Android Apps- nVisium Security
 
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017
The AV-Comparatives Guide to the Best Cybersecurity Solutions of 2017
 
Google android security_2018_report
Google android security_2018_reportGoogle android security_2018_report
Google android security_2018_report
 
sym
symsym
sym
 
Web Application Testing for Today’s Biggest and Emerging Threats
Web Application Testing for Today’s Biggest and Emerging ThreatsWeb Application Testing for Today’s Biggest and Emerging Threats
Web Application Testing for Today’s Biggest and Emerging Threats
 
It's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityIt's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint Security
 

Kürzlich hochgeladen

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Kürzlich hochgeladen (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Android security - an enterprise perspective

  • 1. ANDROID SECURITY an Enterprise Perspective Pietro Maggi EMEA SW Consultant Sales Engineer
  • 2. Pietro I like to take things apart to understand how they works
  • 3. Zebra Spotlight R&D spend 10%+ of Sales ~$3.65B Global Sales ~7,000 Employees Worldwide 4,500+ US & Int’l Patents Issued and Pending
  • 8. Using Data to Monitor Risk: Exploits Vulnerability Initial Claim Headline Unique APKs Peak exploitation after public release (per install) Exploitation before public release (absolute) Master Key 99% of devices vulnerable 1231 < 8 in a million 0 FakeID 82% of Android users at risk 258 <1 in a million 0 Stagefright 95% of devices vulnerable N/A None confirmed N/A Source: Google Safety Net Data; Masterkey data collected from 11/15/2012 to 8/15/2013 and previously published at VirusBulletin 2013. Fake ID data collected data collected from 11/15/2012 to 12/11/2014 and previously published at the RSA Conference 2015. Stagefright data current through May 2016.
  • 10. Overall… For a device to be affected, a user must download and install a PHA that takes advantage of one of the vulnerabilities. Using a Device Policy Controller or other lock-down systems is a very good idea for COSU devices.
  • 11. Google’s role in Android ecosystem security
  • 12. Marshmallow Device Owner APIs for COSU Polish for BYOD Nougat Addressed Customer feedback Boosted security and control for IT admin Polish and control for the user Lollipop Separate managed work profile and private user profile for BYOD Device Owner for corp-liable devices
  • 13. Google Security Services Google Play Android SDK Google services / APIs Security best practices Security improvement program Applications Applications updates AOSP CTS/CDD Security updates Security best practices Device with Android OS Security OTAs Google Application Developers Device Makers Users https://source.android.com/security/
  • 15. Android OS Offers Complete Platform Security 1 Application Isolation Sandboxes & Permissions SELinux TrustZone Services Seccomp Isolated Process 1 Device Integrity Hardware Root Verified Boot Data Encryption Security Services Smart Lock 1 Exploit Mitigation NX ASLR Fortify Source Updateable WebView Integer Overflows Hardened Media Server 1 Management Profiles Administrative APIs Security Integration (VPN, etc.) New or substantially changed since Android 5.0
  • 16. Constant, Independent Verification 11g.co/AndroidSecurityRewards Hundreds of active researchers Over $1 million paid in last 12 months
  • 18. Verify Apps SafetyNet: Complete Security Services for Android Sensor Network Android Device Manager APIS
  • 19. Architecture: Google’s Safety Net for Android Knowledge PHA or Not Data App installs Install Source Application Analysis Static Dynamic Reputation Etc. Other Google Services Search Drive Ads Etc. SafetyNet Analysis Exploit Detection ACE SIC Etc. Android App Sandbox Verified Boot Encryption Etc. Chrome Smart Lock Device Manager Safe Browsing SafetyNet Verify Apps Install Apps Apps Knowledge PHA or not Best practices Knowledge PHA or not Apps Knowledge Risk Signal Data Rare Apps App Install Checks Attest API Protections Warnings Configuration changes Etc Device Data Events Measurements Configurations Etc. Google Play App X App Y App Z
  • 20. 2 billion devices protected 1+ billion device scans per day 50+ billion apps checked per day
  • 21. Potentially Harmful Application Rates Since 2014 1
  • 22. Potentially Harmful Application Rates Since 2014 1
  • 26. Zebra’s role in Android devices security
  • 27. Zebra Security – 3 Key Paradigms Build on a solid foundation Android Enterprise Focus on the task EMM, Kiosk Security Life Cycle Management
  • 29. Zebra Extended Life Cycle Security Support HOW TO SECURE ENTERPRISE PLATFORMS? Enterprise Demand New OS Platforms 1 Consumer Market Adoption is required 2 Successful Consumer OS Will Be Aggressively Attacked 3 30 Day / Quarterly Security Patch Updates
  • 30. Zebra Extended Life Cycle Security Support HOW DO I STAY SECURE MEETING MY TOTAL COST OF OWNERSHIP GOALS? Consumer Operating Systems Have limited security support life 1 Security Patches 2+ Years Beyond End-of-Sale Enterprise Customers keep devices in services for 5yrs or more. 2
  • 31. Zebra Extended Life Cycle Security Support HOW DO I STAY SECURE DURING OS UPDATES? Security OS Transition Period (OTP) Consumer Operating Systems Have limited security support life 1 Enterprise Customers keep devices in services for 5yrs or more. 2
  • 32. Zebra Extended Life Cycle Security Support Zebra vs Consumer Typical Consumer Zebra Device Life Cycle Device Avail for Sale No commit, <2yrs 3, 4 or 5yrs Post End of Ship Service None Additional 3, 4 or 5yrs Typical Customer Device Refresh 24-29 months* 3-7yrs + Security Life Cycle 30 Days Security Updates Some Vendors Yes1 Security Patch Level Indication Yes (M+) Yes (M+) Update Duration from First Ship 36 months / 40 months *60 months / 84months OS Transition Period None 12 months Extended OS Transition Period None Available ($) 1 Security Updates released every quarter during the extended life cycle
  • 33. Source: USA Department of Homeland Security: Study on Mobile Device Security: link The most important defense against mobile device security threats is to ensure devices are patched against publicly known security vulnerabilities and are running the most recent operating system version. Installation of patches ensures that devices cannot be trivially targeted with well- known public exploits, but rather an attacker must invest time, resources, and risk of detection into developing more sophisticated attack methods. Running the most recent operating system ensures devices are benefiting from general security architecture improvements that provide resilience against vulnerabilities that may not yet be publicly known.
  • 34. References • Android security bulletins: https://source.android.com/security/bulletin/index.html • Android Security 2016 Year in Review: https://security.googleblog.com/2017/03/diverse-protections-for-diverse.html • LifeGuard for Android: https://www.zebra.com/us/en/products/software/mobile-computers/lifeguard.html • USA Department of Homeland Security: Study on Mobile Device Security: https://www.dhs.gov/sites/default/files/publications/DHS%20Study%20on%20Mobile %20Device%20Security%20-%20April%202017-FINAL.pdf • Google’s Best Practices for Security and Privacy https://developer.android.com/training/best-security.html