Mobile Device Management:
|
|
|
- Joseph Mason
- 10 years ago
- Views:
Transcription
1 Mobile Device Management: A Risk Discussion for IT Decision Makers Mobile Device Management (MDM) software provides IT organizations with security-relevant capabilities that support the integration of mobile devices into enterprise networks. MDM products support enterprise-owned devices, as well as user-owned devices in what is commonly called the bring-your-own device (BYOD) scenario. This document describes the high-level architecture and capabilities of MDM solutions, and introduces key security issues to consider when deploying them. Overview of Mobile Security Smartphones and tablets are personal computers running a general-purpose operating system (OS), and as such their basic threat model overlaps considerably with that of conventional desktops, laptops, and servers. Yet they differ in three respects, each of which changes the threat model. First, mobile devices are by definition portable. Naturally, this greatly increases the risk of them being lost or stolen. It also increases the risk of adversaries gaining temporary physical access, e.g. when they are left unattended in a hotel room or held for inspection by customs at a national border, and the risk that sensitive information like passwords can be observed when they are used in a public area. Second, all smartphones and many tablets can connect to the Internet over cellular networks. This means that, even if they never leave the organization s premises, they have a path to the Internet that cannot be observed or filtered by the enterprise s network defenses, such as firewalls, proxies, and intrusion detection or prevention systems. Enterprises cannot rely on perimeter defenses alone to prevent or detect the compromise of mobile devices with cellular data connectivity. Finally, mobile devices are generally equipped with many more physical sensors than a typical personal computer: cameras, microphones, GPS receivers, accelerometers, and so on. With the ability to collect information from the physical world, malicious software on a mobile device can compromise security even without ever connecting to the enterprise network: it can record video and audio during sensitive discussions and track the user s location in real time. A compromised mobile device could be used by an adversary to collect valuable information in less obvious ways as well. For example, public research has shown that it s feasible to derive a keystroke log from an audio recording of a user typing on a nearby keyboard. Threat Model for Enterprise-owned Devices Given the security-relevant characteristics described above, certain risks are involved in an enterprise deployment of mobile devices. Only enterprise-owned devices are considered here; the BYOD scenario in which personal devices are brought onto an enterprise network represents a superset of the risks discussed here and is not fully explored. However, these risks must be placed into a context that includes the realization that some of these risks exist to an even greater extent on desktop or laptop systems. The risks Malicious software or hardware may be introduced by an adversary with brief physical access to the device. This is sometimes referred to in public literature as the evil maid attack, since hotel housekeeping staff will have physical access to any devices left unattended in a hotel room. Sensitive data could be recovered from a lost or stolen device. This includes data stored on the device, and also network data that can be accessed using credentials stored on the device. If the device is powered on when the adversary acquires it, information could be recovered from RAM in addition to permanent storage. A remote attacker could exploit a software vulnerability to gain access to the device. Additional vulnerabilities could be exploited to execute code in the kernel, bypassing the OS s security policies. Unprivileged malicious applications spyware or Trojan horses could collect sensitive information and send it to adversaries even without exploiting any The Information Assurance Mission at NSA August 2012 ADF FS
2 vulnerabilities in the OS. When connected to an insecure network, the device s communications could be passively collected, or actively intercepted and modified by a man-in-themiddle. This can lead to the compromise of sensitive data either directly, or indirectly by making it possible to install malicious software. Sensitive information could be leaked inadvertently through the use of applications that are not malicious but were not designed with security in mind, e.g. social or advertising software that makes use of a user s location, contact list, or web history. A well-configured MDM solution can mitigate some, but not all, of these risks. The following sections discuss the typical MDM product and its capabilities. MDM Architecture MDM is best understood as a complement to, rather than an augmentation of, a mobile device s security features; an MDM product s capabilities fundamentally depend on the management interfaces made available to it by the underlying mobile OS. In fact, even when an MDM vendor provides a similarly-named product for multiple mobile OS platforms, considerable differences exist between the enterprise management capabilities possible on each platform. Furthermore, neither MDM products nor any commercially-supported 3rd party software enable an enterprise to carry out arbitrary modifications to the underlying mobile OS platform. This represents a fundamental departure from the traditional managed desktop paradigm, in which 3rd party software can run highly-privileged code with power equal to that of the OS. Yet, mobile OS platforms include very powerful security-enhancing features such as application isolation and mandatory code signing that have yet to be widely implemented on desktop or server platforms. For the general-purpose use case, it is not at all clear that the lack of some enterprise controls makes these devices more vulnerable than other mobile platforms. MDM products typically involve an agent on the mobile devices, a server component used by administrative personnel within the enterprise enclave, and an intermediary service operated by the platform vendor. The on-device agent may be a hidden part of the mobile OS itself, or it may take the form of a 3rd party app distributed through online app repositories which is permitted some additional privileges to conduct its management activities. The platform vendor s intermediary typically maintains a continuous connection to the devices to facilitate ondemand queries and commands from the enterprise. If a product includes additional major architectural components beyond those described above, for example additional servers within the enterprise s enclave or additional intermediary servers operated by the MDM vendor, then the additional components impact on architectural risk should be carefully considered. Key What happens if this component is compromised by an attacker? What happens if it fails and goes offline? Who is responsible for and has insight into this component s security and reliability, the enterprise or a third party? When evaluating an MDM solution, decision-makers should understand its overall network architecture. Key How many servers will need to be deployed on the enterprise network, and what degree of access will they require to internal services such as mail, calendars, and corporate directories? What connections from the outside Internet will these servers need to accept? The MDM servers should be deployed in a network s Demilitarized Zone (DMZ), with firewalls ensuring that they have the minimum required access to both the Internet and the enterprise intranet. The trust relationships between the product s various components should also be well-understood before making a decision to deploy. Key Sensitive information should be encrypted at rest and in transit. Which components of the product have access to which cryptographic keys? Can the product be configured in a way that increases
3 convenience but may expose the cryptographic keys? Clients and servers typically communicate with one another using protocols of some kind. Key questions Do they use strong, mutual cryptographic authentication, or can messages be easily spoofed? If a valid client is compromised by an adversary, what degree of access to the server can the adversary gain by exploiting these command protocols? If the communications between a product s various components are carried over simple, industry-standard protocols, then the enterprise s technical analysts can and should independently verify vendor claims about the product s trust relationships using off-the-shelf packet inspection tools. If, on the other hand, the product relies on undocumented protocols that are proprietary to the MDM vendor, the task of independently verifying vendor claims becomes prohibitively time-consuming and expensive, as well as decreasing the product s interoperability. Capabilities Typically Available The following capabilities of the mobile OS are typically activated by MDM software. Data-at-Rest Protection. Mobile device platforms offer a passcode lock feature, which is used to prevent unauthorized access to the device and also to generate a key to encrypt data stored on it, guarding against improper disclosure of confidential information if the device is lost or stolen. The role of an MDM solution is usually only to ensure that the platform s encryption facilities are activated and used in a manner consistent with enterprise security policy, and are not disabled by individual users. As such, the capabilities of the OS should be understood first and foremost when considering mobile device encryption. Vendors are typically eager to advertise algorithms and key size, but these are not the only factors that are important when considering mobile device encryption. Equally important are the questions of what data is encrypted and how the encryption keys are created and stored. Key Is the entire device encrypted, or only certain partitions? Are files and per-application storage areas encrypted individually? How are encryption keys derived from the user s passcode? How expensive would an offline bruteforce attack be? Is there a recovery or key escrow mechanism? Can it be disabled? Are encryption keys cleared from RAM when no longer needed? Whether the entire device, per-application storage areas, or separate storage partitions are encrypted is dependent upon the particular mobile OS. In addition to managing the platform s built-in encryption features, some MDM products may independently encrypt the MDM agent application s own data as well. Be aware that although such a feature can, if implemented correctly, prevent the MDM agent s data from being recovered from a lost or stolen device, it cannot protect the MDM agent from privileged malicious software running on the device. An MDM agent application is one tenant among many on the OS, and its memory and execution can be completely controlled by an attacker who compromises a bug in the OS to gain elevated privileges. Remote Wipe. MDM software usually also provides the ability for administrators to remotely erase a device. This is another countermeasure against the risk of sensitive data being improperly disclosed, but its effectiveness depends on the device being accessible via the network after it is lost. Key questions regarding remote wipe features How thorough is the wipe and how long does it take to complete? Is all data on the device erased, or only data associated with certain applications? Is the erased data overwritten with zeros, cryptographically made unavailable by erasing a decryption key, or just unlinked from the filesystem? Is the wipe command restricted to administrators, or
4 can users initiate a remote wipe as soon as they notice a device is missing? Can the MDM software be configured to automatically initiate a wipe under certain circumstances, e.g. a large number of failed authentication attempts? Can the MDM software verify that the wipe has occurred? Application Policies. MDM solutions often allow administrators to create policies that govern which apps are installed on the managed devices. Depending on the features of the MDM product and underlying OS, a variety of policies can be supported. Decision makers evaluating an MDM product should understand the app installation policies the product supports and how they align with the organization s mobile security goals. Key To forbid the installation of unapproved apps, does the product support whitelists, or only blacklists? Can the product also mandate that certain required apps be installed on all managed devices? Does the policy identify apps by name only, or can it also permit or deny apps by other attributes like their version, developer ID or certificate, or use of securitysensitive OS services? For example, it might be desirable for an organization to forbid the installation of any unapproved app that can track the user s location, or record audio, while still allowing apps that don t use those services. Enterprise App Deployment. Although app deployment isn t necessarily related to MDM, some MDM products can facilitate the deployment of in-house or specially approved apps over enterprise distribution channels. Decision makers considering the use of these enterprise app distribution facilities should understand the infrastructure involved in setting up app distribution and its impact on their network attack surface. Key questions Is app deployment handled by a separate server on the enterprise network, which must be maintained and secured? Does this server need to accept requests directly from the Internet, or can the managed devices connect to it over a Virtual Private Network (VPN)? It s also important to understand how much control administrators have over the cryptographic signing of apps deployed through an MDM product. Key questions Does the MDM product sign apps itself, or does it simply distribute app packages that are already signed? Does it verify app signatures before deployment? If it signs apps, does it sign them with a dedicated enterprise provided certificate that can be revoked without impacting other MDM features? Version Reporting. A basic feature offered by many MDMs is a capability to report which versions of the OS and applications are installed on each managed device. Most products should allow administrators to manually query version information; automation and integration can make this feature more effective. Key questions Can the product automatically send alerts to administrators or end-users when a device has fallen behind on security patches? Can it automatically revoke a device s credentials, or even initiate a wipe, if a device has been left in an unmanaged or unattended state for an extended period of time? Does the product offer a scripting interface so that enterprise administrators can create automated reports, alerts, and actions that are customized to the organization s needs? Detection of User-initiated Platform Modification. Some MDM products can perform limited inspections of the underlying mobile OS to detect the artifacts of user installed jailbreak or root tools. Since MDM agents typically run with limited privileges, they stand little chance of detecting sophisticated malicious software, but they can sometimes detect user misbehavior that significantly weakens the mobile device s security posture. VPN. Mobile OSes usually have built-in support for connecting to VPN s; an MDM product can facilitate the deployment of consistent VPN configuration to all
5 managed devices. Decision-makers should understand the capabilities of their mobile OS, and whether a given MDM product is a good complement to them. Key Can the VPN be configured to connect automatically, or must the user manually initiate the connection? Once the device is connected to the VPN, does all traffic pass through the encrypted tunnel, or is some traffic still transmitted in cleartext? Can the platform prevent the user from disabling the VPN? The mobile OS should support certificate based VPN authentication, with individual certificates for each user. Related Does the MDM have features to ease the management of those certificates? Can it automatically revoke a user s certificate if a security violation is detected, for example a device being reported as stolen, falling too far behind on critical security patches, or having unapproved apps installed? WiFi and Cellular Network Restrictions. In addition to using a VPN, preventing a device from connecting to insecure networks is another means of protecting sensitive network communications. Some mobile OSes may allow MDM policy to restrict which WiFi networks, or which Access Point Names for cellular networks, a device can connect to. For enterprise controlled devices, the ability to specify a whitelist for WiFi networks remains highly desirable, despite potential incompatibility with the BYOD scenario. Certificate Trust Management. The security of mobile devices depends to a large extent on PKI certificates, which can be used to authenticate VPN s, websites, applications, and even MDM policy itself. The OS maintains a list of trusted certificate authorities; any certificate issued by one of those CAs is accepted by the OS as legitimate. An attacker who acquires a fraudulent certificate signed by a trusted CA, or who causes the OS to trust a fraudulent CA, can intercept, decrypt, and modify all of the device s communications, and possibly install malicious software. It s important that an enterprise understand the set of CAs its devices trust for this reason. Most MDM products allow an enterprise to add an enterprise s in-house CA to the list. Some products may also automatically add a CA associated with the MDM vendor; when evaluating a product, determine whether it does this and what the impact is on device security and trust relationships. Ideally, administrators would also be able to use an MDM solution to remove unwanted CAs and query devices trusted CA lists. Policy for Connection to PCs. Most mobile devices can be connected to a personal computer for data transfer, debugging, and software installation or update. A device being connected to a malicious or compromised PC can therefore lead to the compromise of the data stored on the device, or the device itself. MDM policy should be able to limit the attack surface a device exposes to connected PCs disabling debugging, for example, or requiring that a passcode be entered for access or limit which PCs can connect to the device. Ideally, administrators would also be able to query a log of which PCs a device has been connected to. Conclusion The use of a well-configured MDM solution can ensure that the built-in security features of an enterprise s devices are consistently enabled and configured to meet the organization s security needs. Organizations are encouraged to consider MDM when planning a mobile device deployment. Decision-makers should also understand, however, that MDM doesn t add new security features to a platform; it is a way to automate the configuration of the security features already provided by the platform. Therefore, there remain residual risks that MDM alone cannot mitigate; and there remain capability gaps for some high-security scenarios that MDM software cannot yet satisfy. Please refer to the related NSA Information Assurance document Mobile Device Management: Capability Gaps for High Security Use Cases for further discussion. A Product of the Network Components and Applications Division NSA Information Assurance 9800 Savage Rd. Ft. Meade, MD DSN:
Mobile First Government
Mobile First Government An analysis of NIST and DISA requirements for the adoption of commercially available mobility platforms by government agencies August 2013 415 East Middlefield Road Mountain View,
How To Protect Your Mobile Devices From Security Threats
Back to the Future: Securing your Unwired Enterprise By Manoj Kumar Kunta, Global Practice Leader - Security Back to the Future: Securing your Unwired Enterprise The advent of smartphones and tablets has
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
UNCLASSIFIED Version 1.0 May 2012
Secure By Default: Platforms Computing platforms contain vulnerabilities that can be exploited for malicious purposes. Often exploitation does not require a high degree of expertise, as tools and advice
Enterprise Apps: Bypassing the Gatekeeper
Enterprise Apps: Bypassing the Gatekeeper By Avi Bashan and Ohad Bobrov Executive Summary The Apple App Store is a major part of the ios security paradigm, offering a central distribution process that
Supplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities
BlackBerry 10.3 Work and Personal Corporate
GOV.UK Guidance BlackBerry 10.3 Work and Personal Corporate Published Contents 1. Usage scenario 2. Summary of platform security 3. How the platform can best satisfy the security recommendations 4. Network
Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices
Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices It s common today for law enforcement
BYPASSING THE ios GATEKEEPER
BYPASSING THE ios GATEKEEPER AVI BASHAN Technology Leader Check Point Software Technologies, Ltd. OHAD BOBROV Director, Mobile Threat Prevention Check Point Software Technologies, Ltd. EXECUTIVE SUMMARY
Addressing NIST and DOD Requirements for Mobile Device Management
Addressing NIST and DOD Requirements for Mobile Device Management Whitepaper 2013 ForeScout Technologies, Inc. All rights reserved. Call Toll-Free: 1.866.377.8771 www.forescout.com Contents 1. OVERVIEW
NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015
NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X
Hands on, field experiences with BYOD. BYOD Seminar
Hands on, field experiences with BYOD. BYOD Seminar Brussel, 25 september 2012 Agenda Challenges RIsks Strategy Before We Begin Thom Schiltmans Deloitte Risk Services Security & Privacy Amstelveen [email protected]
Security for Mac Computers in the Enterprise
Security for Mac Computers in the Enterprise October, 2012 Mountain Lion 10.8 Contents Introduction 3 Service and App Protection 4 Gatekeeper 4 Digital Signatures and Developer IDs 4 App Sandboxing 5 Mandatory
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING INFORMATION TECHNOLOGY STANDARD Name Of Standard: Mobile Device Standard Domain: Security Date Issued: 09/07/2012 Date Revised:
Guidance End User Devices Security Guidance: Apple ios 7
GOV.UK Guidance End User Devices Security Guidance: Apple ios 7 Updated 10 June 2014 Contents 1. Changes since previous guidance 2. Usage Scenario 3. Summary of Platform Security 4. How the Platform Can
Mobile Device Management
1. Introduction Mobile Device Management This document introduces security risks with mobile devices, guidelines for managing the security of mobile devices in the Enterprise, strategies for mitigating
WIND RIVER SECURE ANDROID CAPABILITY
WIND RIVER SECURE ANDROID CAPABILITY Cyber warfare has swiftly migrated from hacking into enterprise networks and the Internet to targeting, and being triggered from, mobile devices. With the recent explosion
Windows Phone 8 Security Overview
Windows Phone 8 Security Overview This white paper is part of a series of technical papers designed to help IT professionals evaluate Windows Phone 8 and understand how it can play a role in their organizations.
Secure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.
The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
BYOD Guidance: BlackBerry Secure Work Space
GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.
Building A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
Guidance End User Devices Security Guidance: Apple OS X 10.9
GOV.UK Guidance End User Devices Security Guidance: Apple OS X 10.9 Published 23 January 2014 Contents 1. Changes since previous guidance 2. Usage Scenario 3. Summary of Platform Security 4. How the Platform
Guideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
How To Protect Your Mobile Device From Attack
Manage and Secure the Mobile Data, Not Just the Device Stijn Paumen VP Business Development, Wandera The Great Platform Shift 60,000,000 iphone BlackBerry 50,000,000 40,000,000 30,000,000 20,000,000 10,000,000
How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device
Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population
Use of tablet devices in NHS environments: Good Practice Guideline
Use of Tablet Devices in NHS environments: Good Practice Guidelines Programme NPFIT Document Record ID Key Sub-Prog / Project Technology Office Prog. Director Chris Wilber Status APPROVED Owner James Wood
INSTANT MESSAGING SECURITY
INSTANT MESSAGING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part
Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation... 1. Areas for Improvement... 2
Report No. 13-35 September 27, 2013 Appalachian Regional Commission Table of Contents Results of Evaluation... 1 Areas for Improvement... 2 Area for Improvement 1: The agency should implement ongoing scanning
Achieving PCI Compliance Using F5 Products
Achieving PCI Compliance Using F5 Products Overview In April 2000, Visa launched its Cardholder Information Security Program (CISP) -- a set of mandates designed to protect its cardholders from identity
Feature List for Kaspersky Security for Mobile
Feature List for Kaspersky Security for Mobile Contents Overview... 2 Simplified Centralized Deployment... 2 Mobile Anti-Malware... 3 Anti-Theft / Content Security... Error! Bookmark not defined. Compliance
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.
OWA vs. MDM Introduction SmartPhones and tablet devices are becoming a common fixture in the corporate environment. As feature phones are replaced with new devices such as iphone s, ipad s, and Android
Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems
Course: Information Security Management in e-governance Day 1 Session 5: Securing Data and Operating systems Agenda Introduction to information, data and database systems Information security risks surrounding
When enterprise mobility strategies are discussed, security is usually one of the first topics
Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
Payment Card Industry (PCI) Data Security Standard
Payment Card Industry (PCI) Data Security Standard Security Scanning Procedures Version 1.1 Release: September 2006 Table of Contents Purpose...1 Introduction...1 Scope of PCI Security Scanning...1 Scanning
nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.
CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such
Windows Phone 8 devices will be used remotely over 3G, 4G and non-captive Wi-Fi networks to enable a variety of remote working approaches such as
GOV.UK Guidance End User Devices Security Guidance: Windows Phone 8 Updated 14 October 2013 Contents 1. Usage Scenario 2. Summary of Platform Security 3. How the Platform Can Best Satisfy the Security
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
The Cloud App Visibility Blindspot
The Cloud App Visibility Blindspot Understanding the Risks of Sanctioned and Unsanctioned Cloud Apps and How to Take Back Control Introduction Today, enterprise assets are more at risk than ever before
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
Chapter 8 A secure virtual web database environment
Chapter 8 Information security with special reference to database interconnectivity Page 146 8.1 Introduction The previous three chapters investigated current state-of-the-art database security services
Why Digital Certificates Are Essential for Managing Mobile Devices
WHITE PAPER: WHY CERTIFICATES ARE ESSENTIAL FOR MANAGING........... MOBILE....... DEVICES...................... Why Digital Certificates Are Essential for Managing Mobile Devices Who should read this paper
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
BYOD Guidance: Good Technology
GOV.UK Guidance BYOD Guidance: Good Technology Published 16 March 2015 Contents 1. About this guidance 2. Summary of key risks 3. Architectural components 4. Technical assessment 5. Other considerations
Full Drive Encryption Security Problem Definition - Encryption Engine
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 Full Drive Encryption Security Problem Definition - Encryption Engine Introduction for the FDE Collaborative Protection Profiles
Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control
Network and Host-based Vulnerability Assessment
Network and Host-based Vulnerability Assessment A guide for information systems and network security professionals 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free:
SENSE Security overview 2014
SENSE Security overview 2014 Abstract... 3 Overview... 4 Installation... 6 Device Control... 7 Enrolment Process... 8 Authentication... 9 Network Protection... 12 Local Storage... 13 Conclusion... 15 2
Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014
Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security
Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2
Texas Wesleyan Firewall Policy Purpose... 1 Scope... 1 Specific Requirements... 1 PURPOSE Firewalls are an essential component of the Texas Wesleyan information systems security infrastructure. Firewalls
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks
Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks A look at multi-vendor access strategies Joel Langill TÜV FSEng ID-1772/09, CEH, CPT, CCNA Security Consultant / Staff
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations
Mobile Security: Threats and Countermeasures
Mobile Security: Threats and Countermeasures Introduction Mobile devices are rapidly becoming the primary end-user computing platform in enterprises. The intuitive user-experience, robust computing capabilities,
Using Remote Desktop Clients
CYBER SECURITY OPERATIONS CENTRE December 2011 Using Remote Desktop Clients INTRODUCTION 1. Remote access solutions are increasingly being used to access sensitive or classified systems from homes and
Achieving PCI-Compliance through Cyberoam
White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting
Network Security: 30 Questions Every Manager Should Ask Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting Network Security: 30 Questions Every Manager/Executive Must Answer in Order
Recommended 802.11 Wireless Local Area Network Architecture
NATIONAL SECURITY AGENCY Ft. George G. Meade, MD I332-008R-2005 Dated: 23 September 2005 Network Hardware Analysis and Evaluation Division Systems and Network Attack Center Recommended 802.11 Wireless
Symantec Mobile Management Suite
Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the
BYOD in the Enterprise
BYOD in the Enterprise MDM. The solution to BYOD? Context Information Security [email protected] October 2013 Context Information Security 30 Marsh Wall, London, E14 9TP +44 (0) 207 537 7515
{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com
{ipad Security} plantemoran.com for K-12 Understanding & Mitigating Risk Plante Moran The ipad is in K-12. Since its debut in April 2010, the ipad has quickly become the most popular tablet, outselling
RFI Template for Enterprise MDM Solutions
RFI Template for Enterprise MDM Solutions 2012 Zenprise, Inc. 1 About This RFI Template A secure mobile device management solution is an integral part of any effective enterprise mobility program. Mobile
WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise
WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise WICKSoft Corporation http://www.wicksoft.com Copyright WICKSoft 2007. WICKSoft Mobile Documents
Driving Company Security is Challenging. Centralized Management Makes it Simple.
Driving Company Security is Challenging. Centralized Management Makes it Simple. Overview - P3 Security Threats, Downtime and High Costs - P3 Threats to Company Security and Profitability - P4 A Revolutionary
Security Considerations for DirectAccess Deployments. Whitepaper
Security Considerations for DirectAccess Deployments Whitepaper February 2015 This white paper discusses security planning for DirectAccess deployment. Introduction DirectAccess represents a paradigm shift
PCI Data Security Standards (DSS)
ENTERPRISE APPLICATION WHITELISTING SOLUTION Achieving PCI Compliance at the Point of Sale Using Bit9 Parity TM to Protect Cardholder Data PCI: Protecting Cardholder Data As the technology used by merchants
PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES
PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute
Host/Platform Security. Module 11
Host/Platform Security Module 11 Why is Host/Platform Security Necessary? Firewalls are not enough All access paths to host may not be firewall protected Permitted traffic may be malicious Outbound traffic
Architecture Overview
Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and
BYOD: End-to-End Security
BYOD: End-to-End Security Alen Lo MBA(CUHK), BSc(HKU), CISA, CCP, CISSP, CISM, CEH IRCA Certified ISMS Lead Auditor, itsmf ISO 20000 Auditor Principal Consultant i-totalsecurity Consulting Limited [email protected]
How To Protect Your Network From Attack From Outside From Inside And Outside
IT 4823 Information Security Administration Firewalls and Intrusion Prevention October 7 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles
Basics of Internet Security
Basics of Internet Security Premraj Jeyaprakash About Technowave, Inc. Technowave is a strategic and technical consulting group focused on bringing processes and technology into line with organizational
Cyber Security Metrics Dashboards & Analytics
Cyber Security Metrics Dashboards & Analytics Feb, 2014 Robert J. Michalsky Principal, Cyber Security NJVC, LLC Proprietary Data UNCLASSIFIED Agenda Healthcare Sector Threats Recent History Security Metrics
SECURITY FOR ENTERPRISE TELEWORK AND REMOTE ACCESS SOLUTIONS
SECURITY FOR ENTERPRISE TELEWORK AND REMOTE ACCESS SOLUTIONS Karen Scarfone, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Many people
Addressing NIST and DOD Requirements for Mobile Device Management (MDM) Essential Capabilities for Secure Mobility. www.maas360.
MaaS360.com > White Paper Addressing NIST and DOD Requirements for Mobile Device Management (MDM) Essential Capabilities for Secure Mobility www.maas360.com 1 Copyright 2014 Fiberlink Communications Corporation.
Data Protection Act 1998. Bring your own device (BYOD)
Data Protection Act 1998 Bring your own device (BYOD) Contents Introduction... 3 Overview... 3 What the DPA says... 3 What is BYOD?... 4 What are the risks?... 4 What are the benefits?... 5 What to consider?...
Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness
CISP BULLETIN Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness November 21, 2006 To support compliance with the Cardholder Information Security Program (CISP), Visa USA
10 Potential Risk Facing Your IT Department: Multi-layered Security & Network Protection. September 2011
10 Potential Risk Facing Your IT Department: Multi-layered Security & Network Protection September 2011 10 Potential Risks Facing Your IT Department: Multi-layered Security & Network Protection 2 It s
In-Depth Look at Capabilities: Samsung KNOX and Android for Work
In-Depth Look at Capabilities: Samsung KNOX and Android for Work Silent Install Using the Samsung KNOX Workspace Mobile Device Management (MDM) APIs, IT admins can install and enable applications automatically.
Closing Wireless Loopholes for PCI Compliance and Security
Closing Wireless Loopholes for PCI Compliance and Security Personal information is under attack by hackers, and credit card information is among the most valuable. While enterprises have had years to develop
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Georgia Institute of Technology Data Protection Safeguards Version: 2.0
Data Protection Safeguards Page 1 Georgia Institute of Technology Data Protection Safeguards Version: 2.0 Purpose: The purpose of the Data Protection Safeguards is to provide guidelines for the appropriate
Securing Office 365 with MobileIron
Securing Office 365 with MobileIron Introduction Office 365 is Microsoft s cloud-based productivity suite. It includes online versions of Microsoft s most popular solutions, like Exchange and SharePoint,
BlackBerry Device Software. Protecting BlackBerry Smartphones Against Malware. Security Note
BlackBerry Device Software Protecting BlackBerry Smartphones Against Malware Security Note Published: 2012-05-14 SWD-20120514091746191 Contents 1 Protecting smartphones from malware... 4 2 System requirements...
Information Security Services
Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual
