Conducting a Risk Assessment for Mobile Devices



Similar documents
10 best practice suggestions for common smartphone threats

BlackBerry 10.3 Work and Personal Corporate

BYOD Guidance: BlackBerry Secure Work Space

Mobile Device Management

Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices

Logging In: Auditing Cybersecurity in an Unsecure World

COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING

Hands on, field experiences with BYOD. BYOD Seminar

A framework for auditing mobile devices

Information Blue Valley Schools FEBRUARY 2015

EndUser Protection. Peter Skondro. Sophos

Don t Lose the Data: Six Ways You May Be Losing Mobile Data and Don t Even Know It

North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP

Internet threats: steps to security for your small business

BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

ONE DEVICE TO RULE THEM ALL! AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

How To Make Bring Your Own Device A Plus, Not A Risk

Chris Boykin VP of Professional Services

Securing Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper

Information Security It s Everyone s Responsibility

Network/Cyber Security

Cyber Security. John Leek Chief Strategist

10 Quick Tips to Mobile Security

{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com

Cyber Self Assessment

Analysis of the Mobile Endpoint Security Products Market Tackling the Shift to Mobility with a Strong Endpoint Security Solution.

F G F O A A N N U A L C O N F E R E N C E

Securing Corporate on Personal Mobile Devices

If you can't beat them - secure them

SECURITY OF HANDHELD DEVICES TAKE CONTROL OF THE MOBILE DEVICE

Data Access Request Service

Bring Your Own Device (BYOD) & Customer Data Protection Are You Ready?

Symantec Mobile Management for Configuration Manager 7.2

Control Issues and Mobile Devices

Secure Your Mobile Workplace

Guideline on Safe BYOD Management

BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE

BYOD: BRING YOUR OWN DEVICE.

How To Protect Your Mobile Device From Attack

BYOD in the Enterprise

Guide to Vulnerability Management for Small Companies

Privacy Officer Job Description 4/28/2014. HIPAA Privacy Officer Orientation. Cathy Montgomery, RN. Presented by:

End User Devices Security Guidance: Apple ios 8

BYOD: End-to-End Security

Mobile Device Management for CFAES

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking

10 Potential Risk Facing Your IT Department: Multi-layered Security & Network Protection. September 2011

Data Security on the Move. Mark Bloemsma, Sr. Sales Engineer Websense

YOUR HIPAA RISK ANALYSIS IN FIVE STEPS

Data Protection Act Bring your own device (BYOD)

Mobile Security & BYOD Policy

CHECK POINT Mobile Security Revolutionized. [Restricted] ONLY for designated groups and individuals

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

Mobile First Government

Protecting Corporate Data from Mobile Threats. And the emerging role for microsd-based security Art Swift CEO, CUPP Computing

WHITE PAPER THE CIO S GUIDE TO BUILDING A MOBILE DEVICE MANAGEMENT STRATEGY AND HOW TO EXECUTE ON IT

Jim Donaldson, M.S., MPA, CHC, CIPP/US, CISSP. Director of Compliance, Chief Privacy and Information Security Officer. Pensacola, Florida

Security Threat Risk Assessment: the final key piece of the PIA puzzle

BYOD AND ME. How cell phone hacking effects your business.! Richard Rigby CEO Wraith Intelligence

White Paper. Data Security. The Top Threat Facing Enterprises Today

Samsung Mobile Security

Bring Your Own Device. Individual Liable User Policy Considerations

BYOD File Sharing Go Private Cloud to Mitigate Data Risks

Mobile Device Security Is there an app for that?

Attachment A. Identification of Risks/Cybersecurity Governance

The Protection Mission a constant endeavor

Central Agency for Information Technology

The Cloud App Visibility Blindspot

Ibrahim Yusuf Presales Engineer at Sophos Smartphones and BYOD: what are the risks and how do you manage them?

Laptops, Tablets, Smartphones and HIPAA: An Action Plan to Protect your Practice

The User is Evolving. July 12, 2011

Technical Note. ForeScout MDM Data Security

IT Self Service and BYOD Markku A Suistola

Transcription:

Conducting a Assessment for Mobile Devices May 9, 2012 David Frei Director, Digital/Information Security Specialist

The Changing Environment Today s Discussion Available Industry Assessment Models Unique considerations when conducting a risk assessment for mobile devices Understanding the business requirements and objectives Assessing threats, vulnerabilities, & impact to the business Response: Evaluating mitigation techniques Monitoring the risks A case study of a recent mobile device risk assessment Slide 2

The Changing Environment Slide 3

Consumerization of Technology Use of Smartphones in the Workplace 12% 25% Phone of Choice Choice within a Predefined List No Choice 63% Source: Symantec (March 2011) Slide 4

Increase in functionality/power 2004 2012 Slide 5

Increase in Downloaded Apps Slide 6

Emergence of Security Products Data Loss Prevention (DLP) Antivirus Enhanced Mobile Device Management Platforms Slide 7

The Complex, Changing Environment Consumer data mixing with corporate data Number of malicious apps and malware on the rise Hackers will find vulnerabilities Costs of data loss near record highs As power and functionality increases, so does risk Per Gartner: Security will lag business needs by 4-10 years Employees want to use devices of their choice to access corporate data and treat them as personal devices Slide 8

Question: You can t stop the freight train, so what can you do? Answer: Assess the s to your Environment and Develop a Mitigation Plan Slide 9

Available Industry Assessment Models Slide 10

Available Industry Assessment Models ISO 27005 NIST Special Publications 800-30 and 800-39 OCTAVE Slide 11

ISO 27005 Information Security Management Available Industry Assessment Models Slide 12

Available Industry Assessment Models NIST Special Publication 800-30 Management Guide for Information Technology Systems Slide 13

Available Industry Assessment Models NIST Special Publication 800-39 Managing Information Security Slide 14

OCTAVE- Available Industry Assessment Models Full S Allegro Slide 15

Available Industry Assessment Models General Assessment Steps Step 1: Understand environment, requirements and objectives, risk tolerance, and boundaries Step 2: Identify threats, vulnerabilities, and existing controls to determine risks Step 3: Assess risks based on impact and likelihood Step 4: Determine risk response. Document final risk determination and approval/acceptance Step 5: Ongoing monitoring of risks and response Slide 16

Unique considerations when conducting a risk assessment for mobile devices Slide 17

Unique Considerations Understanding the business requirements and objectives (Step 1) Assessing threats, vulnerabilities, & impact to the business (Step 2-3) Response: Evaluating mitigation techniques (Step 4) Monitoring the risks (Step 5) Slide 18

Understanding the Business Requirements and Objectives Breadth of Program Travel profile Need for central management/# of users BYO/Corporate owned/reimbursement Program Corporate culture and ability to limit/control users Need/ability to install own apps Company liability for downloaded apps Resources to be accessed Data Classification Slide 19

Assessing Threats, Vulnerabilities, & Portability = Easily lost Jailbreaking Impact to the Business High variability in OSs Frequent patch release by vendors and delayed release by providers Ability to remotely install applications on Android Man-in-the mobile attacks Are apps to be trusted? Are users considering app permissions? Slide 20

Assessing Threats, Vulnerabilities, & Impact to the Business Breaking of encryption/security controls Uncontrolled expansion of data footprint Security of data in transit via unsecured wireless networks Are existing technology tools (DLP) and processes (ediscovery) compatible/inclusive of mobile devices? Corporate rush to embrace mobile Perform a security assessment on the device Slide 21

Assessing Threats, Vulnerabilities, & Impact to the Business Impacts to Business Lost employee productivity Loss of sensitive data Negative publicity Customer turnover Litigation Costs of Top 5 Data Breach Incidents Organization 1. Electronics/Consumer Products Est. Cost $225M-$2B 2. Retailer/Consumer Products $225M 3. Marketing Services $100M-$200M 4. Financial Services $140M 5. Federal Govt. Entity $25M Slide 22

Response: Evaluating Mitigation Techniques Define a set of allowable devices/versions Use built in capabilities and combine with third-party management utilities and security tools Implement policies and procedures Implement training and awareness for users Signed acknowledgement of acceptable use Utilize encryption and sandboxes Limit sensitive data from being accessed/stored Slide 23

Monitoring the s Why? More powerful devices being released New vulnerabilities/threats New apps and defensive technologies being released Slide 24

Assessment Reminders Document the risk assessment, including decisions Include all reasonable risks Identify and engage key stakeholders Obtain sign-off on risk plan Slide 25

Case Study: Mobile Device Deployment Slide 26

Case Study: Mobile Device Deployment Step 1: Understand environment, requirements and objectives, risk tolerance, and boundaries Consumer Products Company with mobile sales workforce of about ~2,500 users Organization is technically savvy but previously only supported Blackberry devices Organization is risk averse and very attentive to legal risks and ramifications Goal: Allow sales workforce to use employee owned devices for access to email, calendar, and internally hosted sales call application Goal: Limit support burden on a relatively small IT staff Slide 27

Case Study: Mobile Device Deployment Step 2: Understand threats, vulnerabilities, and existing controls to define risks R1: Data stored locally on devices is accessible to individuals that find the device after being lost or while left unattended. R2: Data from Device is transferred to unmanaged devices R3: Attackers use features enabled on devices to gain access to sensitive information on a device that they do not possess. R4: Malicious software is installed on devices that allows leak of data. R5: Compromised devices are used as a launching pad to further gain access to corporate information. R6: Data is taken out of a Secure Container on the device. R7: Data is left on the device during phone replacement/upgrade Slide 28

Case Study: Mobile Device Deployment Step 3: Assess risks based on impact and likelihood Initial Assessment Results Catastrophic Major R5 R3 R6 R2 R7 R4 R1 High s: R1 Lost Devices R2 Data Transfer R4 Malicious Software R7 Phone Disposal Moderate Moderate s: R3 Feature Attack R5 Launchpad R6 Secure Container Impact Minor Insignificant Remote Unlikely Possible Likely Almost certain Likelihood of Occurrence Slide 29

Case Study: Mobile Device Deployment Step 4: Determine risk response. Document final risk determination and approval/acceptance Organization identified risk mitigation techniques to reduce the risk to an acceptable level: Select set of approved devices identified Third-party management utility used to enforce security parameters and device limitations Use of a product that included encrypted container to separate corporate/personal data Users were provided a stipend for purchase, signed user acceptance policies, and received security training Slide 30

Case Study: Mobile Device Deployment Step 4: Determine risk response. Document final risk determination and approval/acceptance Statement Initial Control Plan Final R1: Data stored locally on devices is accessible to individuals that find the device after being lost or while left unattended. High Remote Wipe Lost Phone Reporting Line Encourage data pruning Power on Password Timeout Password Failed Login Limit Data Encryption Password protect data cards Enable Asset Tracking Use portals instead of apps that store data locally Moderate Slide 31

Case Study: Mobile Device Deployment Step 4: Determine risk response. Document final risk determination and approval/acceptance Statement Initial Control Plan Final R2: Data from Device is transferred to unmanaged devices High Define Policies and educate users Limit ability to forward emails to personal emails or access to sharing sites Require backups to be encrypted Implement DLP Moderate Slide 32

Case Study: Mobile Device Deployment Step 4: Determine risk response. Document final risk determination and approval/acceptance Statement Initial Control Plan Final R3: Attackers use features enabled on devices to gain access to sensitive information on a device that they do not possess. Moderate Switch Bluetooth to hidden mode, disable when not in use Educate users on granting permissions to apps Educate users on connecting to secured wifi hotspots Low Slide 33

Case Study: Mobile Device Deployment Step 4: Determine risk response. Document final risk determination and approval/acceptance Statement Initial Control Plan Final R4: Malicious software is installed on devices that allows leak of data. High Sync limits on OS versions and jailbroken devices Limit install of unsigned apps Limit running of java applets Route Internet Traffic through corporate web filtering Consider building corporate app store for tested/approved apps Implement DLP Moderate Slide 34

Case Study: Mobile Device Deployment Step 4: Determine risk response. Document final risk determination and approval/acceptance Statement Initial Control Plan Final R5: Compromised devices are used as a launching pad to further gain access to corporate information. Moderate Limit network segments that devices can access Require second level authentication Low Slide 35

Case Study: Mobile Device Deployment Step 4: Determine risk response. Document final risk determination and approval/acceptance Statement Initial Control Plan Final R6: Data is taken out of a Secure Container on the device. Moderate Prevent data from being copied out of container Require backups to be encrypted Low Slide 36

Case Study: Mobile Device Deployment Step 4: Determine risk response. Document final risk determination and approval/acceptance Statement Initial Control Plan Final R7: Data is left on the device during phone replacement/up grade High Implement Corporate Wipe Program Train users on disposal technique Moderate Slide 37

Case Study: Mobile Device Deployment Outcomes: 4 High s and 3 Medium s reduced to 4 Medium s and 3 Low s Company management accepted the reduced risk of the program based upon the compensating controls identified Sign-off was documented by the CIO and CFO Program will be monitored on an ongoing basis by management and corporate audit Step 5: Ongoing monitoring of risks and response Slide 38

Summary Consumerization of IT is impacting all companies in some way, shape or form Companies that plan for the change through a risk assessment and risk mitigation process are best suited to successfully enable the technology Understand your corporate environment and culture for risk acceptance Devise and monitor a risk mitigation strategy that best fits your environment Slide 39