isse mobile device policy enforcement

17
Mobile Device Policy Enforcement John Rhoton Lead Technologist – Mobility HP Services

Upload: john-rhoton

Post on 23-Jan-2015

1.018 views

Category:

Technology


0 download

DESCRIPTION

Mobile Device Policy Enforcement ISSE 2007

TRANSCRIPT

Page 1: ISSE Mobile Device Policy Enforcement

Mobile Device Policy Enforcement

John RhotonLead Technologist – MobilityHP Services

Page 2: ISSE Mobile Device Policy Enforcement

Context & Agenda1. Mobile devices2. Air interfaces

• Bluetooth, 802.11b, WWAN

3. Remote Access• Tunnels (VPNs), Roaming

4. Perimeter Security• Compartmentalization, Access Controls

5. Policy Enforcement Options

11 22

3 3

44

Page 3: ISSE Mobile Device Policy Enforcement

Threats to Mobile DevicesStolen information

– Host intrusion, stolen device

Unauthorized network/application access– Compromised credentials, host intrusion

Virus propagation– Virus susceptibility

Lost information– Lost, stolen or damaged device

Mabir

Win CE DUTS Win CE

BRADOR

29Dec041Feb05

Locknut (Gavno)

Vlasco

21Nov04

Skulls

20June04

Cabir

17Jul04

5Aug048Mar05

Comwar

7Mar05

Dampig

12Aug04

Qdial

4Apr05

Fontal

6Apr05

Drever

18Mar05

Hobbes

15Apr05

Doomed

4Jul05

= Symbian OS (Nokia, etc)= Windows CE (HP, etc)Source: Trend Micro

Page 4: ISSE Mobile Device Policy Enforcement

Mobile Content ProtectionAccess Control Solutions

Native Pocket PC

Biometric Authentication

HP ProtectTools

Pointsec

Credant

TrustDigital

Utimaco

Bluefire

Page 5: ISSE Mobile Device Policy Enforcement

Multi-tiered security

Page 6: ISSE Mobile Device Policy Enforcement

WiFi Protect Access (WPA)Temporal Key Integrity Protocol

– Fast/Per packet keying, Message Integrity Check

WPA-Personal

WPA-Enterprise

Page 7: ISSE Mobile Device Policy Enforcement

Rogue and Decoy Access Points

Highest risk when WLANs are NOT implemented– Usually completely unsecured

– Connected by naïve (rather than malicious) users

Intrusion Detection Products – Manual, Sensors, Infrastructure

Multi-layer perimeters– 802.1x

– RBAC, VPN

Decoys can be counteractedwith automated configuration

InternetIntranetAccess

Page 8: ISSE Mobile Device Policy Enforcement

Unauthorized Wireless Bridge

Private LAN

Public Network

Page 9: ISSE Mobile Device Policy Enforcement

Mobile Device ManagementIT Manager Use-Cases

1) Search and select target end-user2) View/Add/Delete end-users3) View/Add/Delete device instances4) View device history of each end-user5) View detailed device information6) View/Add/Remove applications from devices7) View and process diagnostic results8) View/Add/Modify Rules9) View/Add/Modify approved applications10)View/Add/Modify settings for email, WIFI,

VOIP11)Lock/Unlock Devices

Page 10: ISSE Mobile Device Policy Enforcement

Mobile Device Security Management

Provisioning security tools

Policy enforcement– Passwords– Device lock– Policy updates

User support– Device lockout– Backup/restore

Security

Usability

Page 11: ISSE Mobile Device Policy Enforcement

MSFPMessaging and Security Feature Pack

Exchange 2003 SP2

Windows Mobile 5.0(Persistent Storage)

S/MIME

Certificate-based Authentication

Policy Enforcement

Local wipe

Remote wipe

Page 12: ISSE Mobile Device Policy Enforcement

Enterprise Requirements

Integrated Management Console– Directory (AD/LDAP) integration

Centralized Policies– Policy polling

– User cannot remove

– Screen-lock / Idle-lock

Page 13: ISSE Mobile Device Policy Enforcement

Credant OTA Sync Control

Exchange 2003

Local

ActiveSync

HANDHELD

Gatekeeper

Local Gatekeeper can

detect devices which sync

via local connection

Internet

Server

ActiveSync

Exchange Server

App Servers

OTA Sync

Control

OTA Sync Control detects

devices which sync via

Server Activesync.

Based on ISAPI extension

Provides automatic network detection and remediation of mobile devices attempting to synchronize with Microsoft Exchange

Page 14: ISSE Mobile Device Policy Enforcement

Trust DigitalMobile Edge Perimeter Security

Wireless Provisioning Portal – Device and user registration integrated with enterprise use policy

acceptance

– Over-the-air (OTA) delivery of Trust Digital software and policy

Advanced Features – Asset, activity, and compliance reporting

– Help Desk functionality including self-service portal

Network Admission Control – Ensures security/compliance of end-user device

– Interrogates devices before allowing access

– Integrated with Microsoft ISA Server

Page 15: ISSE Mobile Device Policy Enforcement

SMS

TCP/IP

WW Wireless Operator Networks

HP Enterprise Devices

SMS

TCP/IP

HP Enterprise Mobility Suite

HP Worldwide Hosting Facilities

Enterprise

HTTPS

Internet

HTTPS

• Device Support• S/W Maintenance• WW Network Support

FusionDM for Enterprise

• Device Troubleshooting• Device Security• Policy Mgmt• Asset Mgmt• IT Dash Board

• Exchange®• Domino®• Groupwise®

• Corporate Directory• Active Directory ®

• Intranet• CRM• Application Portal

Existing IT Systems

HTTPS

FOR ENTERPRISE

Leading OEM Device Manufacturers

Page 16: ISSE Mobile Device Policy Enforcement

Self Care Driven

Page 17: ISSE Mobile Device Policy Enforcement

Summary

Security concerns are greatest mobility obstacle

Mobility introduces new risks

Industry has addressed the main threats

Primary user challenge is secure configuration

Primary enterprise challenge is consistent policy enforcement

MDM reduces cost of deployment and enfoces policies