ios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback - http://j.mp/psumac33



Similar documents
Deploying iphone and ipad Security Overview

ipad in Business Security

Deploying iphone and ipad Mobile Device Management

ios Security October 2012

iphone in Business Mobile Device Management

Apple ios 8 Security

company policies are adhered to and all parties (traders,

ios Security October 2014 ios 8.1 or later

Guidance End User Devices Security Guidance: Apple ios 7

ipad in Business Mobile Device Management

ios Security ios 9.0 or later September 2015

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

iphone in Business Security Overview

Mobile Device Management ios Policies

FINAL DRAFT. APPLE ios 9 SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) CONFIGURATION TABLE. Version 1, Release 0.1.

End User Devices Security Guidance: Apple OS X 10.10

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Deploying iphone and ipad Apple Configurator

End User Devices Security Guidance: Apple ios 8

Introduction to AirWatch and Configurator

Guidance End User Devices Security Guidance: Apple OS X 10.9

iphone in Business How-To Setup Guide for Users

How To Use A Microsoft Mobile Security Software For A Corporate Account On A Mobile Device

APPLE & BUSINESS. ios ENTERPRISE SECURITY ENTERPRISE NEEDS CONFIGURATION PROFILES

{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com

Ensuring the security of your mobile business intelligence

Ensuring the security of your mobile business intelligence

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM

Security for Mac Computers in the Enterprise

iphone and ipad in Business Deployment Scenarios

MDM: Enabling Productivity in the world of mobility. Sudhakar S Peddibhotla Director of Engineering, Good Technology

DTI / Titolo principale della presentazione IPHONE ENCRYPTION. Litiano Piccin. 11 ottobre 2014

Securely Yours LLC We secure your information world. www. SecurelyYoursllc.com

Absolute Manage MDM. John Wu Systems Engineer

PMDP is simple to set up, start using, and maintain

Apple Configurator MDM Site - Review

MOBILE SECURITY. As seen by FortConsult. Lars Syberg Head of Security Services

BYOD Guidance: BlackBerry Secure Work Space

LabTech Mobile Device Management Overview

ios Enterprise Deployment Overview

ios Keychain Weakness FAQ Further Information on ios Password Protection

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2

Managing ios Devices. Andrew Wellington Division of Information The Australian National University XW11

Systems Manager Cloud-Based Enterprise Mobility Management

Apple ios Security in the Enterprise

Salesforce1 Mobile Security Guide

Mobile First Government

Why you need. McAfee. Multi Acess PARTNER SERVICES

Mobile Device Management Solution Hexnode MDM

Xperia TM. Read about how Xperia TM devices can be administered in a corporate IT environment

A Hard Pill to Swallow?

Xperia TM Security. Read about how Xperia TM devices manage security in a corporate IT environment

Mobile Configuration Profiles for ios Devices Technical Note

Analyzing the Security Schemes of Various Cloud Storage Services

Addressing NIST and DOD Requirements for Mobile Device Management

APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION

Security Guide. BlackBerry Enterprise Service 12. for BlackBerry. Version 12.0

IAIK. Motivation 2. Advanced Computer Networks 2015/2016. Johannes Feichtner IAIK

SYNCSHIELD FEATURES. Preset a certain task to be executed. specific time.

CompTIA Mobile App Security+ Certification Exam (ios Edition) Live exam IOS-001 Beta Exam IO1-001

BlackBerry Enterprise Service 10. Universal Device Service Version: Administration Guide

ios Hardening Configuration Guide For ipod Touch, iphone and ipad devices running ios 8.3 or higher.

Default Policy Settings ZENworks Mobile Management 2.7.x

Managing Mobility. 10 top tips for Enterprise Mobility Management

ENTERPRISE SECURITY. ios Security Lecture 5 COMPSCI 702

WIND RIVER SECURE ANDROID CAPABILITY

FAQ for ipad (ios 5.x)

Systems Manager Cloud Based Mobile Device Management

ios Security and Mobile Device Management Whitepaper

SENSE Security overview 2014

SharePlus Enterprise: Security White Paper

Deploying iphone and ipad Apple Configurator

In-Depth Look at Capabilities: Samsung KNOX and Android for Work

Security Guide. BlackBerry 10 Device

Please Complete Speaker Feedback Surveys. SecurityTube.net

Kaspersky Security for Mobile Administrator's Guide

ManageEngine Desktop Central. Mobile Device Management User Guide

Security Guide. BES12 Cloud. for BlackBerry

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

Oracle Mobile Security

Securing Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper

Smartphone Security Overview

AirWatch for Android Devices

1. Introduction Activation of Mobile Device Management How Endpoint Protector MDM Works... 5

ios$hardening$ Configura0on$Guide For$iPod$Touch,$iPhone$and$iPad$devices$running$iOS$7.0.6$or$higher.

Building Apps for iphone and ipad. Presented by Ryan Hope, Sumeet Singh

The Privilege of Android Privacy. How PRIV Safeguards Your Data

umobilecam Setup Guide All-in-One Mobile Surveillance for Android, ios, Mac, Windows Webcam, IP camera (version 1.0)

Forensic analysis of iphone backups

BYOD: End-to-End Security

Tutorial on Smartphone Security

Transcription:

ios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback - http://j.mp/psumac33

Why care about ios Security? 800M 800 million ios devices activated 130 million in last year 98% of Fortune 500 600M 400M 200M 0M Sep '10 Oct '11 Mar '12 Sep '12 Jan '13 Jun '13 Oct '13 Jun '14

Definitions Public and Private Keys Certificate AES-256

Definitions Public and Private Keys Two mathematically linked keys One is public and can be used to encrypt data One is private and can be used by the recipient to decrypt data.!

Definitions AES-256 and SHA-1 Two specs for encrypting data AES-256 generates 256 bit keys SHA-1 generates 160 bit keys!

Definitions Certificates and Certificate Authorities A certificate is an electronic document used to prove the ownership of a public key. A certificate authority (CA) is a trusted group who digitally signs a certificate to signify its veracity.!

ios Security Decoded Secure Boot Chain Hardware Security Software Security Network Security Best Practices

Secure Boot Chain Starts at power on. Each step verifies the next. If any step fails, device enters Device Firmware Upgrade (DFU) mode.

Secure Boot Chain Step 1 - Boot ROM Implicitly trusted Cannot be changed Verifies signature of next Low-Level Bootloader via embedded Apple Root CA public key Runs Low-Level Bootloader!!

Secure Boot Chain Step 2 - Low-Level Bootloader (LLB)! Lowest level of code on device that can be updated Verifies signatures of firmware and iboot Runs iboot

Secure Boot Chain Step 3 - iboot! Verifies signature of ios Kernel (XNU) Starts kernel If kernel verification fails, device goes into Recovery Mode (Connect to itunes Mode)

Secure Boot Chain Baseband and Secure Enclave have their own secure boot chain processes which run before the kernel is loaded.

Hardware Security

Hardware Security Crypto Engine Co-processor dedicated to AES-256 functions Built into DMA path between flash storage and RAM Stores UID and GID

Hardware Security Unique ID (UID) Exclusive Chip ID (ECID) Group ID (GID) AES-256 keys fused into the processor during manufacturing.

Hardware Security Unique ID (UID) Unique to every device processor Not recorded by Apple or manufacturer Cannot be read by firmware or software

Hardware Security Exclusive Chip ID (ECID) Unique to every device Not secret Used in device activation process and during software update

Hardware Security Group ID (GID) Shared among devices with a common Apple processor, e.g. A5X or A7 Used along with ECID to determine proper software update packages

Hardware Security Secure Enclave Co-processor new to A7 Manages all crypto operations Stores keys in encrypted memory Not accessible to software, only to processor

Hardware Security Touch ID 550 ppi raster scan of sub-dermal fingerprint Forwards data to Secure Enclave, which vectorizes and stores data Data never leaves Secure Enclave - processor only receives a yes or no if fingerprint matches.

Software Security

Software Security Code Signing All executable code must be signed using an Apple-issued certificate Apple code is signed internally by Apple App Store Code is signed by Apple Developer and Apple In-house code is signed with Enterprise Developer Program cert

Software Security Sandboxing Apps cannot access system files or files from other apps All access to info from outside sandbox is through approved APIs Most built-in & all third-party apps run as non-privileged user Apps can share data via custom URL schemes and shared keychain groups

Software Security ASLR Address Space Layout Randomization protects against memory exploitations System library locations also randomized at startup

Software Security Data Protection (1) Enabled via use of a passcode Every file on data partition is encrypted Encryption keys are stored in Effaceable Storage When device is wiped, effaceable Storage is securely erased, and data partition is deleted. Device returns to factory state.

Software Security Data Protection (1I) Files are marked with a Data Protection Class to determine when they are accessible. Complete protection - only accessible when device is unlocked Protected Unless Open - accessible only if app has file open while device is locked Protected Until First User Authentication - Accessible only after a post-reboot unlock No protection - encrypted, but accessible whether device is locked or unlocked

Software Security Data Protection (III) Keychains and Keybags are protected similarly, with varying levels of assignable protection.

Network Security

Network Security Firewall? No firewall Reduces attack surface by limiting entry points Apps that open ports are heavily sandboxed

Network Security VPN L2TP, PPTP, IPSec Cert-based VPN on Demand Per-app VPN

Network Security Wi-Fi WEP (no!) WPA/WPA2 Personal and Enterprise 802.1x authentication

Network Security AirDrop Bluetooth LE for discovery Encrypted peer-to-peer Wi-Fi for transfer

Network Security Apple Services All Apple services that involve user data are encrypted end-to-end. icloud, imessage, FaceTime, Siri, Push Notifications, App Store, Software Updates

Network Security icloud Backup Encrypted files stored on icloud servers Keys for files stored in icloud backup Keybag based on their protection class Keybag is encrypted with a randomized key stored in user s icloud account When restoring to new device, icloud retrieves key from account and unlocks keybag to allow restore Files copied to new device are re-encrypted using new device s UID

Best Practices

Best Practices Passcode, Passcode, Passcode! Data Protection is only enabled when a passcode is used. Prevents physical use of almost all device features. Data Protection uses passcode + UID to strengthen encryption. Brute force decryption attempts would have to occur on the device. Use a complex passcode, or manage via profile Turn on Erase after 10 failed attempts

Best Practices Don t Jailbreak Breaks the secure boot chain Weakens Data Protection Dramatically increases attack surface As of June 2014, 8 of 11 known ios malware threats relied on a jailbroken device.

Best Practices Avoid Unknown idep Apps Apps signed with Developer Enterprise Program No code review

Best Practices Enable Find My iphone Find your device if lost, but also Activation Lock - prevents your device from being wiped or re-activated without your icloud login

Best Practices Use Apple Configurator or MDM (1) Enforce passcode policies allow simple value, require alphanumeric value, minimum length, minimum number of complex chars, max passcode age, passcode history, autolock timeout, grace period for device lock. max number of failed attempts, allow touch ID

Best Practices Use Apple Configurator or MDM (II)

Best Practices Use Apple Configurator or MDM (III) Remote Wipe (MDM) Supervised Mode (Configurator) Disable Camera, FaceTime, Siri, icloud, app installs, YouTube, itunes Store, Safari, and more

References & Resources ios Security - February 2014 http://images.apple.com/ipad/business/docs/ios_security_feb14.pdf Apple ios 7 Security Technical Implementation Guide http://iase.disa.mil/stigs/net_perimeter/wireless/smartphone.html ios Hardening Configuration Guide http://www.asd.gov.au/publications/ios7_hardening_guide.pdf ios Malware Does Exist http://blog.fortinet.com/ios-malware-do-exist/

Q&A

Thanks! Feedback - http://j.mp/psumac33