37
Five Steps To Securing Mobile Devices Joel Snyder [email protected] Opus One

Five Steps To Securing Mobile Devicesopus1.com/www/presentations/mobilitysecurity2008.pdf · 2008. 9. 26. · Solve Mobility Security by Forbidding Use of Mobile Devices. Plan B Use

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Five Steps To Securing Mobile Devicesopus1.com/www/presentations/mobilitysecurity2008.pdf · 2008. 9. 26. · Solve Mobility Security by Forbidding Use of Mobile Devices. Plan B Use

Five Steps To SecuringMobile Devices

Joel [email protected]

Opus One

Page 2: Five Steps To Securing Mobile Devicesopus1.com/www/presentations/mobilitysecurity2008.pdf · 2008. 9. 26. · Solve Mobility Security by Forbidding Use of Mobile Devices. Plan B Use

Agenda

l Overview: stating the obvious

l Plan A

l Plan B

• Policy

• Technologies for Data Protection

• Malware Protection

• Authentication Thanks to Andy Briney and CraigMathias for helping prepare this!

Page 3: Five Steps To Securing Mobile Devicesopus1.com/www/presentations/mobilitysecurity2008.pdf · 2008. 9. 26. · Solve Mobility Security by Forbidding Use of Mobile Devices. Plan B Use

Mobile Devices Means…

l Smart Phones & Laptops

l But mostly Smart Phones

Page 4: Five Steps To Securing Mobile Devicesopus1.com/www/presentations/mobilitysecurity2008.pdf · 2008. 9. 26. · Solve Mobility Security by Forbidding Use of Mobile Devices. Plan B Use

Insert Statistics Here

of corporate data resideson mobile devices.

Mobile devices lost orstolen over a 2yr period

(stolen from: Dean Ocampo)

Page 5: Five Steps To Securing Mobile Devicesopus1.com/www/presentations/mobilitysecurity2008.pdf · 2008. 9. 26. · Solve Mobility Security by Forbidding Use of Mobile Devices. Plan B Use

Insert More Statistics Here

Direct costs - $50 per customer(Legal, notification, etc.)

Indirect costs - $15 per customer(Lost employee productivity)

Opportunity costs - $75 per customer(Loss of customer and recruiting new ones)

Government Fines; Regulatory ActionsExposure to legal actionShareholder value lossDiminished Goodwill33 States with Legislation

Data Loss ImpactAverages $140 Per Customer

(stolen from: Dean Ocampo)

Page 6: Five Steps To Securing Mobile Devicesopus1.com/www/presentations/mobilitysecurity2008.pdf · 2008. 9. 26. · Solve Mobility Security by Forbidding Use of Mobile Devices. Plan B Use

Plan ASolve Mobility Security by ForbiddingUse of Mobile Devices

Page 7: Five Steps To Securing Mobile Devicesopus1.com/www/presentations/mobilitysecurity2008.pdf · 2008. 9. 26. · Solve Mobility Security by Forbidding Use of Mobile Devices. Plan B Use

Plan BUse Policy and Technology to providemobility … securely!

Page 8: Five Steps To Securing Mobile Devicesopus1.com/www/presentations/mobilitysecurity2008.pdf · 2008. 9. 26. · Solve Mobility Security by Forbidding Use of Mobile Devices. Plan B Use

Five Pieces of Mobility Security

l Policy for Mobile Devicesl Technology to Protect Data in Motionl Technology to Protect Data at Restl Protection From Malwarel Authentication

Page 9: Five Steps To Securing Mobile Devicesopus1.com/www/presentations/mobilitysecurity2008.pdf · 2008. 9. 26. · Solve Mobility Security by Forbidding Use of Mobile Devices. Plan B Use

FIRST: Start By Building Policy

#1: Policy

l Without a policy…

No Advice:“Employee

IT” inefficient

Liability forLoss:

Negligence?PCI 1.1?

No Boundaries:Anything Goes!

Page 10: Five Steps To Securing Mobile Devicesopus1.com/www/presentations/mobilitysecurity2008.pdf · 2008. 9. 26. · Solve Mobility Security by Forbidding Use of Mobile Devices. Plan B Use

Policy Covers Lifecycle of DevicesDevice

Selection

DeviceDeployment

DeviceUse

DeviceRecovery

Provisioning

ConfigurationMaintenance/Loss

Disposal

#1: Policy

Page 11: Five Steps To Securing Mobile Devicesopus1.com/www/presentations/mobilitysecurity2008.pdf · 2008. 9. 26. · Solve Mobility Security by Forbidding Use of Mobile Devices. Plan B Use

Technology Can Support Your Policy

DeviceSelection

DeviceDeployment

DeviceUse

DeviceRecovery

Provisioning

ConfigurationMaintenance/Loss

Disposal

This is MostlyTechnology

#1: Policy

Page 12: Five Steps To Securing Mobile Devicesopus1.com/www/presentations/mobilitysecurity2008.pdf · 2008. 9. 26. · Solve Mobility Security by Forbidding Use of Mobile Devices. Plan B Use

Users Must Support Your Policy

DeviceSelection

DeviceDeployment

DeviceUse

DeviceRecovery

Provisioning

ConfigurationMaintenance/Loss

Disposal

Device Useincludes:

User signing anAcceptable UsePolicy (AUP)

User beingeducated aboutand buying intosecurity issues

#1: Policy

Page 13: Five Steps To Securing Mobile Devicesopus1.com/www/presentations/mobilitysecurity2008.pdf · 2008. 9. 26. · Solve Mobility Security by Forbidding Use of Mobile Devices. Plan B Use

The Most Fundamental Policy Decision Is

#1: Policy

Who “Owns” This Phone?

Don’t screw up for the sake ofhaving the coolest device!

Page 14: Five Steps To Securing Mobile Devicesopus1.com/www/presentations/mobilitysecurity2008.pdf · 2008. 9. 26. · Solve Mobility Security by Forbidding Use of Mobile Devices. Plan B Use

home work

Generation Y Applies Massive Pressure

home workincludes home

workhomeincludes work

#1: Policy

Page 15: Five Steps To Securing Mobile Devicesopus1.com/www/presentations/mobilitysecurity2008.pdf · 2008. 9. 26. · Solve Mobility Security by Forbidding Use of Mobile Devices. Plan B Use

SECOND: Nothing ImportantMoves Unencrypted

#2: Data In Motion

l There is no spectrum of“important” to“unimportant”

l If you originated thedata, we define it as“important”

Reallyimportant

Not at allimportant

SortaImportant

OursNotOurs

Page 16: Five Steps To Securing Mobile Devicesopus1.com/www/presentations/mobilitysecurity2008.pdf · 2008. 9. 26. · Solve Mobility Security by Forbidding Use of Mobile Devices. Plan B Use

“Moving” means any wirelesscommunication

#2: Data In Motion

l Mobile Data Serviceshave a relatively lowerrisk, but must beprotected

l 802.11 (WiFi) serviceshave huge risk, and mustbe protected

l Bluetooth is notgenerally used for datatransfer… and should notbe, due to design issues

I don’t have to listthe threats here,

do I?

Page 17: Five Steps To Securing Mobile Devicesopus1.com/www/presentations/mobilitysecurity2008.pdf · 2008. 9. 26. · Solve Mobility Security by Forbidding Use of Mobile Devices. Plan B Use

#2: Data In Motion

Cellular Network

IP Layer

App. Layer

Protecting Mobile Data Services CanOccur at Application or IP Layer

l Application Layer requires each application/URL beindividually protected

l Enforces at the firewall

l Opens larger attack surface in the network

l Limits access to “what you can get over Internet”

l Less intrusiveto end-user

l More deviceindependent

Policy element:personal webmail

to be HTTPSencrypted

Page 18: Five Steps To Securing Mobile Devicesopus1.com/www/presentations/mobilitysecurity2008.pdf · 2008. 9. 26. · Solve Mobility Security by Forbidding Use of Mobile Devices. Plan B Use

l IP Layer requires a compatible VPN client to beinstalled on each device–a potential support issue

l Enforces at the firewall and VPN concentrator

l Provides smallest attack surface and greatestaccess

l Can be veryintrusive &annoying

l Need thatVPN client!

#2: Data In Motion

Cellular Network

IP Layer

App. Layer

IP Layer Protection Offers GreaterAccess, but Lower Interoperability

Page 19: Five Steps To Securing Mobile Devicesopus1.com/www/presentations/mobilitysecurity2008.pdf · 2008. 9. 26. · Solve Mobility Security by Forbidding Use of Mobile Devices. Plan B Use

#2: Data In Motion

Wi-Fi is Harder To Control

l Existing corporatestandards for Wi-Fi apply

l And those standardsmust be

• WPA or

• WPA2

l Hot-spots rarely supportlink encryption (T-Mobilethe exception)

l Link encryption good;end-to-end encryptionbetter required

Page 20: Five Steps To Securing Mobile Devicesopus1.com/www/presentations/mobilitysecurity2008.pdf · 2008. 9. 26. · Solve Mobility Security by Forbidding Use of Mobile Devices. Plan B Use

#2: Data In Motion

Wi-Fi is Harder To Control… so we go back to either IP Layer orApplication Layer encryption

Wi-Fi Network

IP Layer

App. LayerIf it’s encryptedhereor here,you don’t have toencrypt it here

Page 21: Five Steps To Securing Mobile Devicesopus1.com/www/presentations/mobilitysecurity2008.pdf · 2008. 9. 26. · Solve Mobility Security by Forbidding Use of Mobile Devices. Plan B Use

THIRD: Nothing Sits AroundUnencrypted

#3: Data at Rest

l As long as no one ever loses a device, youcan safely ignore this one

University of Arizona, Cell Phone Lost and Found collection

Page 22: Five Steps To Securing Mobile Devicesopus1.com/www/presentations/mobilitysecurity2008.pdf · 2008. 9. 26. · Solve Mobility Security by Forbidding Use of Mobile Devices. Plan B Use

Start by Making Sure Your Own DataAre Encrypted

#3: Data at Rest

Encrypted Trafficcipherclear

l Could encrypt individual documentsl Could encrypt partitions within the devicel Could just encrypt the whole volume

But what about devices thatare just too dumb to encrypt?

Page 23: Five Steps To Securing Mobile Devicesopus1.com/www/presentations/mobilitysecurity2008.pdf · 2008. 9. 26. · Solve Mobility Security by Forbidding Use of Mobile Devices. Plan B Use

#3: Data at Rest

Look Beyond The Obvious For FullProtection

Your corporatephone directory hasvaluable & sensitiveinformation

Web browserscache data of allsorts, whether theyare sensitive or not

Emails are cached;SMS/MMS arestored and nottracked.All are sensitive.

Key to remember:Just because it’s not

corporate email,doesn’t mean it’s

not corporate email.

Page 24: Five Steps To Securing Mobile Devicesopus1.com/www/presentations/mobilitysecurity2008.pdf · 2008. 9. 26. · Solve Mobility Security by Forbidding Use of Mobile Devices. Plan B Use

#3: Data at Rest

Device Vendors Don’t Care AboutThis, So Use Third-Party Packages

challengers leaders

niche players visionaries

abili

ty t

o ex

ecute

completeness of vision

Check Point

UltimacoSafeBoot

Credant

GuardianEdge

Entrust

SecuwareBeCrypt

iAnywhere

PGPWinMagic

Info.Security

Vendorswho gaveGartnermoney(July/ 2007)

Page 25: Five Steps To Securing Mobile Devicesopus1.com/www/presentations/mobilitysecurity2008.pdf · 2008. 9. 26. · Solve Mobility Security by Forbidding Use of Mobile Devices. Plan B Use

#3: Data at Rest

On the Other Hand, Craig’s Law SaysWe Will See Organic Growth Here:

“It is inevitable that securityfeatures will roll-up intooperating systems overtime.”

So While Device Vendors Don’t Care,They Will Eventually Fix It!Perhaps Not in Your Lifetime, tho.

Page 26: Five Steps To Securing Mobile Devicesopus1.com/www/presentations/mobilitysecurity2008.pdf · 2008. 9. 26. · Solve Mobility Security by Forbidding Use of Mobile Devices. Plan B Use

#4: Malware Protection

Mobile Devices are Current, HighPriority Targets for Malware

l Threats to Device

• Malware/Viruses/etc.spread throughBluetooth

• … spread through email

• … spread throughringtones

• … spread throughdownloads

l Threats To Organization

• Cost of “900-number”phone calls§ Or International…

• Lost productivity whenmobile worker’s devicecrashes

• Stolen data by Malware

Page 27: Five Steps To Securing Mobile Devicesopus1.com/www/presentations/mobilitysecurity2008.pdf · 2008. 9. 26. · Solve Mobility Security by Forbidding Use of Mobile Devices. Plan B Use

Obvious Answer: Anti-Malware

Equally Obvious Problem: Each Devicehas a different operating system!

#4: Malware Protection

Page 28: Five Steps To Securing Mobile Devicesopus1.com/www/presentations/mobilitysecurity2008.pdf · 2008. 9. 26. · Solve Mobility Security by Forbidding Use of Mobile Devices. Plan B Use

Malware Protection is anOpportunity for Policy to Help

#4: Malware Protection

Policy: Turn offyour Bluetooth

Policy: Don’t beDownloadin’

Policy: Don’tFeel Lucky andOpenAttachments

Policy: Buyyour 12-year-old their ownphone

Policy:Backup!

Page 29: Five Steps To Securing Mobile Devicesopus1.com/www/presentations/mobilitysecurity2008.pdf · 2008. 9. 26. · Solve Mobility Security by Forbidding Use of Mobile Devices. Plan B Use

If You Only Do One Thing…

#4: Malware Protection

Policy: Turn offyour Bluetooth Bluetooth is

your biggestunmitigatedthreat!

Page 30: Five Steps To Securing Mobile Devicesopus1.com/www/presentations/mobilitysecurity2008.pdf · 2008. 9. 26. · Solve Mobility Security by Forbidding Use of Mobile Devices. Plan B Use

Device Management Software CanEnforce Policy and Protect You

#4: Malware Protection

Open Mobile Alliance Device Management

Over The Air (OTA) Management

Password Recovery (Encryption)

Remote Device Lock and Unlock

Remote Device Wipe

Download Policy Enforcement; Backups

Application (Email, Usually) Configuration

Device Provisioning

Features To Look For

Some of this canbe outsourced,with the rightcarrier and plan.

Page 31: Five Steps To Securing Mobile Devicesopus1.com/www/presentations/mobilitysecurity2008.pdf · 2008. 9. 26. · Solve Mobility Security by Forbidding Use of Mobile Devices. Plan B Use

Did I Mention That Your DeviceManagement System Must BeCross-Platform?

#4: Malware Protection

Hint: 6 out of 6 is impossible. Sorry.

Page 32: Five Steps To Securing Mobile Devicesopus1.com/www/presentations/mobilitysecurity2008.pdf · 2008. 9. 26. · Solve Mobility Security by Forbidding Use of Mobile Devices. Plan B Use

Your Last Defense:Authentication

#5: Authentication

Chicago Taxi Statistics, 2005

Page 33: Five Steps To Securing Mobile Devicesopus1.com/www/presentations/mobilitysecurity2008.pdf · 2008. 9. 26. · Solve Mobility Security by Forbidding Use of Mobile Devices. Plan B Use

Authentication Can Occur atMultiple Points During Device Use

#5: Authentication

PeriodicPasswords

Power OnPassword

Application &EncryptionPasswords

Most secure Least secure

Crossing ofFingers

Page 34: Five Steps To Securing Mobile Devicesopus1.com/www/presentations/mobilitysecurity2008.pdf · 2008. 9. 26. · Solve Mobility Security by Forbidding Use of Mobile Devices. Plan B Use

New Technologies May Help…Or Not

#5: Authentication

FingerprintReader

4.4mm

TCG TrustedPlatform Module

Two-FactorAuthentication

Is Available!

Page 35: Five Steps To Securing Mobile Devicesopus1.com/www/presentations/mobilitysecurity2008.pdf · 2008. 9. 26. · Solve Mobility Security by Forbidding Use of Mobile Devices. Plan B Use

Pick Your Authentication StyleBased On Two Key Factors

#5: Authentication

UserCompliance

Risk ofDisclosure

What will the usercommunity put upwith?

Do I need the samepolicy for all users?

How valuable are thedata on this device?

What is my risk if thedata are lost ordisclosed?

Page 36: Five Steps To Securing Mobile Devicesopus1.com/www/presentations/mobilitysecurity2008.pdf · 2008. 9. 26. · Solve Mobility Security by Forbidding Use of Mobile Devices. Plan B Use

Five Steps To Solving the MobilitySecurity Puzzle

Require user authentication at points required foracceptable risk/aggravation.

Authenti-cation

Protect against malware with policy (Bluetooth,downloads) and technology (anti-malware SW).

MalwareProtection

Encrypt data stored on device. Manage cacheddata with 3rd party software and passwords.

Data atRest

Encrypt all data over cell and WiFi networks. UseVPN clients or application layer encryption.

Data InMotion

Create a policy that covers the device lifecycle,from selection to recovery.

Policy

Page 37: Five Steps To Securing Mobile Devicesopus1.com/www/presentations/mobilitysecurity2008.pdf · 2008. 9. 26. · Solve Mobility Security by Forbidding Use of Mobile Devices. Plan B Use

Thanks!

Joel [email protected]

Opus One