Creating Security for BYOD Current Approaches



Similar documents
Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014

Mobile Device Security Is there an app for that?

Bell Mobile Device Management (MDM)

Exchange ActiveSync (EAS)

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Mobile Device Management and Security Glossary

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

Tom Schauer TrustCC cell

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

ios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback -

BYOD Guidance: BlackBerry Secure Work Space

Mobile App Containers: Product Or Feature?

How We Deployed BYOD Using Mobile Device Management

Android Security. Device Management and Security. by Stephan Linzner & Benjamin Reimold

How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device

perspective The battle between MDM and MAM: Where MAM fills the gap? Abstract - Payal Patel, Jagdish Vasishtha (Jags)

Compliance Management for Mobile Devices

Smart Givaudan. From BYOD experience to new mobile opportunities

Systems Manager Cloud Based Mobile Device Management

Special Report. Choosing the right mobile device platform for your business

Mobile Device Management for CFAES

BYOD: End-to-End Security

Ensuring the security of your mobile business intelligence

How To Protect Your Mobile Device From Attack

Troubleshooting BlackBerry Enterprise Service 10 version Instructor Manual

The Future of Mobile Device Management

Feature Matrix MOZO CLOUDBASED MOBILE DEVICE MANAGEMENT

Weak Spots in Enterprise Mobility Management Dennis Schröder

APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION

M a as3 6 0 fo r M o bile D evice s

Embedded Trusted Computing on ARM-based systems

Ben Hall Technical Pre-Sales Manager

Network and Device Level Mobile Security Controls IT Considera-ons in the BYOD Era

Building Apps for iphone and ipad. Presented by Ryan Hope, Sumeet Singh

6 Things To Think About Before Implementing BYOD

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0

Chris Boykin VP of Professional Services

MDM, COPE, BYOD, MAM, MIM, PIM???

curbi for Schools Technical Overview October 2014

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.

Compliance Rule Sets in MaaS360

Total Enterprise Mobility

Tutorial on Smartphone Security

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

How Do I Remove My Office 365 Account From An iphone, ipad or ipod Touch?... 1

Mobile Security Solution BYOD

Frequently Asked Questions & Answers: Bring Your Own Device (BYOD) Policy

Embracing Complete BYOD Security with MDM and NAC

Xperia TM. Read about how Xperia TM devices can be administered in a corporate IT environment

BRING YOUR OWN DEVICE

Five Steps to Android Readiness

HDAA BYOD Workshops May 2013

BlackBerry Enterprise Service 10. Universal Device Service Version: Administration Guide

Follow these steps to setup your Exchange ActiveSync account to your ios device:

APPLE & BUSINESS. ios ENTERPRISE SECURITY ENTERPRISE NEEDS CONFIGURATION PROFILES

Bell Mobile Device Management (MDM)

Mobile Access Software Blade

GETS AIRWATCH MDM HANDBOOK

PULSE APPCONNECT. A Micro VPN That Allows Specific Applications on Mobile Devices to Independently Leverage the Connect Secure Gateway.

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2

In-Depth Look at Capabilities: Samsung KNOX and Android for Work

Evolution of Smartphones And Android Operating System

Example of Standard API

Multi-OS Enterprise Mobility Management. Perfectly balancing end-user and corporate needs

Mobile Device Management Glossary.

Choosing an MDM Platform

Security Guide. BES12 Cloud. for BlackBerry

Guidance End User Devices Security Guidance: Apple ios 7

Chapter 1: Introduction. What is an Operating System?

Advanced Administration

Security Security by Separation

Cloud, security and the mobile enterprise: An end-to-end manageability challenge

Berlin Institute of Technology FG Security in Telecommunications

Configuration Guide BES12. Version 12.1

Providing a jump start to EFI application development and a uniform pre-boot environment

Comprehensive Device Management Platform comprising of Management Suites specialized in addressing different problem domains, extensively

ForeScout MDM Enterprise

Transcription:

Creating Security for BYOD Current Approaches Patrik Ekdahl Ericsson Research - Security

Bring Your Own Device BYOD refers to the act of employees using their personal mobile devices for work-related purposes. - Mason report 2012 Drivers Consumerisation IT departments are too slow to adopt. Personalisation need for employees to feel unique. Work-life integration traditional workday no longer exists. drive for more flexible technology solutions. Productivity enhancement using familiar technologies increased availability Cost Ericsson External 2

History 2000 2007 2008 2010 2012 2013 NIST draft on guidelines for BYOD security. HTC Dream Blackberry 957 iphone Ericsson R380 Several larger companies implement BYOD policies Ericsson External 3

Corporate access Blackberry style Corp. network VPN BES Mail Server Internet Internet Gateway Internal Data Ericsson External 4

Corporate access Blackberry style Corp. network VPN BES Mail Server WiFi-Browser Internet Internet Gateway Internal Data Ericsson External 4

Corporate access Mobile Device Management style Corp. network MDM Application TLS MDM Frontend Mail Calendar Prop. Data Access Internal Data Exchange Server Ericsson External 5

Today s landscape IT s support of BYOD (All devices, US SMEs) Percent of Employees Who Bring their own SmartPhone 25 Don t know 4% 20 Reality No 51% Yes 45% 15 10 In more than 90 % of the companies, people bring their own SmartPhone. 5 0 100 75-99 51-74 50 26-49 1-25 0 Don t know Source: igillottresearch 2013 Ericsson External 6

Some more numbers.. (from a UniSys survey 2012) 72% of IT executives surveyed say that employees are using unsupported devices or apps because of personal preference, not because they need them to do critical work. Ericsson External 7

Some more numbers.. (from a UniSys survey 2012) 72% of IT executives surveyed say that employees are using unsupported devices or apps because of personal preference, not because they need them to do critical work. but what does IT know..? According to another survey.. IT more likely to block Angry Birds than to provide secured alternatives to public cloud storage. Ericsson External 7

Some more numbers.. (from a UniSys survey 2012) 72% of IT executives surveyed say that employees are using unsupported devices or apps because of personal preference, not because they need them to do critical work. but what does IT know..? According to another survey.. IT more likely to block Angry Birds than to provide secured alternatives to public cloud storage. 75% of IT organizations don't let people use their own apps for work purposes, with a substantial subset saying such usage should be grounds for dismissal. Ericsson External 7

Some more numbers.. (from a UniSys survey 2012) 72% of IT executives surveyed say that employees are using unsupported devices or apps because of personal preference, not because they need them to do critical work. but what does IT know..? According to another survey.. IT more likely to block Angry Birds than to provide secured alternatives to public cloud storage. 75% of IT organizations don't let people use their own apps for work purposes, with a substantial subset saying such usage should be grounds for dismissal. 38% percent of the employees decided to ignore such edicts. These people are the ones who drive the business and tend to be in positions of authority. Ericsson External 7

Information owner model Device owner Information owners Device owner Company Bank... Execute any apps they like. Trust that data will not be viewed/erased by enterprise actions. Detach from an enterprise without loosing personal data. Trust the device to protect data access data process data store data Terminate access to their data at any time Ericsson External 8

Device architecture Application Contexts APP-1 APP-2 APP-3 APP-4 APP-5 OS Context Kernel Firmware Context Bootloader, Initialization Code Hardware Context Application Processor, Baseband Processor, Memories, Peripherals, ROM Code Ericsson External 9

Information Domains Application Contexts APP-1 APP-2 APP-3 APP-4 APP-5 OS Context Kernel Firmware Context Bootloader, Initialization Code Hardware Context Application Processor, Baseband Processor, Memories, Peripherals, ROM Code Ericsson External 10

Information Domains Information Contexts IO-1 IO-2 IO-3 IO-4 IO-5 Application Contexts APP-1 APP-2 APP-3 APP-4 APP-5 OS Context Kernel Firmware Context Bootloader, Initialization Code Hardware Context Application Processor, Baseband Processor, Memories, Peripherals, ROM Code Ericsson External 10

Data access Information Contexts IO-1 IO-2 IO-3 IO-4 IO-5 Application Contexts APP-1 APP-2 APP-3 APP-4 APP-5 Ericsson External 11

Data access Information Contexts IO-1 IO-2 IO-3 IO-4 IO-5 Application Contexts APP-1 APP-2 APP-3 APP-4 APP-5 Ericsson External 11

Data access Information Contexts IO-1 IO-2 IO-3 IO-4 IO-5 Application Contexts APP-1 APP-2 APP-3 APP-4 APP-5 Policies and a Policy Enforcement Engine (PEnE) Ericsson External 11

Sealing the information APP-1 APP-2 APP-3 IO-1 IO-2 IO-3 Rich OS Policy Enf. Engine Rich Environment Trusted Environment Ericsson External 12

Sealing the information APP-1 APP-2 APP-3 IO-1 IO-2 IO-3 Rich OS Policy Enf. Engine Rich Environment Trusted Environment Ericsson External 12

Measuring APP-1 APP-2 APP-3 IO-1 IO-2 IO-3 Rich OS Policy Enf. Engine Rich Environment Trusted Environment Ericsson External 13

Measuring APP-1 APP-2 APP-3 IO-1 IO-2 IO-3 Rich OS Policy Enf. Engine Rich Environment Trusted Environment Ericsson External 13

Check point APP-1 APP-2 APP-3 IO-1 IO-2 IO-3 Rich OS Policy Enf. Engine Rich Environment Trusted Environment Ericsson External 14

Check point APP-1 APP-2 APP-3 IO-1 IO-2 IO-3 Rich OS Execute any apps they like. Trust that data will not be viewed/erased by enterprise actions. Detach from an enterprise without loosing personal data. Trust the device to protect data Policy access data Enf. Engine process data store data Terminate access to their data at any time Rich Environment Trusted Environment Ericsson External 14

Trusted Applications APP-1 APP-2 APP-3 TA-1 TA-2 TA-3 Rich OS Trusted Kernel (with PEnE) Secure Storage Rich Environment Trusted Environment Ericsson External 15

Anchoring APP-1 APP-2 APP-3 TA-1 TA-2 TA-3 Rich OS Trusted Kernel (with PEnE) Secure Storage Rich Environment Trusted Environment Ericsson External 16

Anchoring TA-1 TA-2 TA-3 Roots of trust Execution Storage Trusted Kernel (with PEnE) Secure Storage Verification Reporting Measurement Isolation from Rich OS Narrow well-defined API Trusted Environment Ericsson External 16

Management TA-1 TA-2 TA-3 Trusted Kernel (with PEnE) Secure Storage Trusted Environment Ericsson External 17

Management Corporate Server Administration data packages APP-1 APP-2 APP-3 TA-1 TA-2 TA-3 Install / uninstall Key provisioning State enquiring Rich OS Trusted Kernel (with PEnE) Secure Storage Rich Environment Trusted Environment Ericsson External 17

Management Corporate Server TLS connection Data fetch Administration data packages State reporting APP-1 APP-2 APP-3 TA-1 TA-2 TA-3 Install / uninstall Key provisioning State enquiring Rich OS Trusted Kernel (with PEnE) Secure Storage Rich Environment Trusted Environment Ericsson External 17

Check point APP-1 APP-2 APP-3 TA-1 TA-2 TA-3 Rich OS Trusted Kernel (with PEnE) Secure Storage Rich Environment Trusted Environment Ericsson External 18

Check point APP-1 APP-2 APP-3 TA-1 TA-2 TA-3 Rich OS Execute any apps they like. Trust that data will not be viewed/erased by enterprise actions. Detach from an enterprise without loosing personal data. Trusted Kernel (with PEnE) Trust the device to protect data access data Secure process datastorage store data Terminate access to their data at any time Rich Environment Trusted Environment Ericsson External 18

Standardization efforts Ericsson External 19

Conclusions Using a Trusted Execution Environment we can build a owner-controlled BYOD solution with hardware anchored trust. Non-proprietary solution exists Multiple stakeholders Device Owner is in control No need for BES Hardware anchored separation Information Execution Remote administration Ericsson External 20

21