security considerations for mobile devices

29
This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner audience or other authorized recipients. This presentation may contain information that is confidential, proprietary or otherwise legally protected, and it may not be further copied, distributed or publicly displayed without the express written permission of Gartner, Inc. or its affiliates. © 2012 Gartner, Inc. and/or its affiliates. All rights reserved. Trent Henry Research VP Security & Risk Management Security Considerations for Mobile Devices

Upload: ellis

Post on 25-Feb-2016

48 views

Category:

Documents


2 download

DESCRIPTION

Security Considerations for Mobile Devices. Trent Henry Research VP Security & Risk Management. Gartner delivers the technology-related insight necessary for our clients to make the right decisions, every day. “Small” Incidents are Common. Agenda. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Security Considerations for  Mobile Devices

This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner audience or other authorized recipients. This presentation may contain information that is confidential, proprietary or otherwise legally protected, and it may not be further copied, distributed or publicly displayed without the express written permission of Gartner, Inc. or its affiliates.© 2012 Gartner, Inc. and/or its affiliates. All rights reserved.

Trent HenryResearch VP

Security & Risk Management

Security Considerations for Mobile Devices

Page 2: Security Considerations for  Mobile Devices

Gartner delivers the technology-related insight necessary for our clients to make the right decisions, every day.

Page 3: Security Considerations for  Mobile Devices

“Small” Incidents are Common

Page 4: Security Considerations for  Mobile Devices

Agenda

• What’s really new about risks for mobile devices?• Controls you may put on your list of requirements• What about user experience?• How do mobile security architectures compare?• Why and when would you improve on existing platform

security controls?

Page 5: Security Considerations for  Mobile Devices

Gartner for Technical Professionals

What’s really new about risks for mobile devices?

Page 6: Security Considerations for  Mobile Devices

Threat Agents

Malware

Threat type: logical Coexists with user

Examples:• Redsn0w Jailbreak• Android

FoncyDropper • ZitMo

Thief

Threat type: physical Exclusive access

Example:• Plenty in the room

6

Evil maid

Threat type: physical Coexists with user

Examples:• Stealing a file

system

Page 7: Security Considerations for  Mobile Devices

Old risks, in new context

7

Impa

ct

Likelihood

Thief Malware

It is only a matter of time before the first large data breach concerning a mobile device receives media attention

Impa

ctLikelihood

Expanding use cases

and storage capacity

Increased popularity

Page 8: Security Considerations for  Mobile Devices

Impact on Security Architecture

• The security risks to information have not changed:- Malicious software- Theft/loss of the device- Eavesdropping

• But there are new twists:- Endpoint ownership- No dominant operating system or paradigm- Very short device life cycle- Immature management and security tools- Usability and network connectivity

Page 9: Security Considerations for  Mobile Devices

Impact on Security ArchitectureRisk

ManagementNo data on device

Controls in the Apps(Container)

Controls on thedevice

ManagementNone

Manage the device (requiredfor certificates) i.e. MDM

Limited (manage container only)

ConnectivityRequired

On-line only

Offline

Application/User Experience

VDI/Web app/App w/ remote data

Resident App (dev/COTS) w/security

Resident App (dev/COTS) w/o security

Native Apps

Example 1 – No Data on the Device

Page 10: Security Considerations for  Mobile Devices

Impact on Security ArchitectureRisk

ManagementNo data on device

Controls in the Apps(Container)

Controls on thedevice

ManagementNone

Manage the device (requiredfor certificates) i.e. MDM

Limited (manage container only)

ConnectivityRequired

On-line only

Offline

Application/User Experience

VDI/Web app/App w/ remote data

Resident App (dev/COTS) w/security

Resident App (dev/COTS) w/o security

Native Apps

Example 2 – Data within a Container Only

Page 11: Security Considerations for  Mobile Devices

Impact on Security ArchitectureRisk

ManagementNo data on device

Controls in the Apps(Container)

Controls on thedevice

ManagementNone

Manage the device (requiredfor certificates) i.e. MDM

Limited (manage container only)

ConnectivityRequired

On-line only

Offline

Application/User Experience

VDI/Web app/App w/ remote data

Resident App (dev/COTS) w/security

Resident App (dev/COTS) w/o security

Native Apps

Example 3 – Data on the Device

Page 12: Security Considerations for  Mobile Devices

Gartner for Technical Professionals

Controls you may put on your list of requirements

Page 13: Security Considerations for  Mobile Devices

Access Control

• Consider- Methods: PIN, password, swipe, face unlock,

hardware token, other biometrics- Policies to enforce: password

complexity/history/delay/lock, inactivity timer- Risks of keyloggers and other spyware- Limitations facing laboratory attacks that

circumvent authentication

13

• Aims to reduce the risk of Thieves and Evil Maids by preventing direct logical access to device

Page 14: Security Considerations for  Mobile Devices

Encryption

• Aims to reduce the risk of Thieves and Evil Maids by preventing logical access to extracted information

• Consider• Encryption and keys in hardware/software• Keys derived from device and/or passcode?• What information is encrypted?• Cache management• Known weaknesses and third party validations

14

011010000101

Page 15: Security Considerations for  Mobile Devices

Application Controls

15

• Aim to reduce the risk of Malware and Evil Maids by preventing direct logical access to applications and their data

• Consider• Application and data isolation• Signatures• Key management and encryption APIs• Management hooks• Application store controls• Kill switch: remotely kill an application on all devices

App App

Data Data

Page 16: Security Considerations for  Mobile Devices

Remote and Local Wipe

• Aims to reduce the risk of Thieves by remotely or locally wiping applications and data

• Consider- Full/partial wipe- Local/remote wipe- What information and apps are wiped- The wiping method - How to confirm completion

16

Page 17: Security Considerations for  Mobile Devices

Gartner for Technical Professionals

What about user experience?

Page 18: Security Considerations for  Mobile Devices

Let’s keep sensitive information off the device entirely!

18

An example: Client Virtualization

No controls needed on the device

Connection secured with encryption

User authenticated prior to access

…But malware, keyloggers, and jailbroken devices may be a problem

Page 19: Security Considerations for  Mobile Devices

You gotta be kidding me! Access to Information Secure Time-to-market Manageability Rich and Immersive UX Offline Native Capabilities Portability

Page 20: Security Considerations for  Mobile Devices

Comparison Assessment

20

*You are responsible for building your own security controls!

*

Page 21: Security Considerations for  Mobile Devices

Broader Impact: Network Architecture

• Increasing radio spectrum consumption - An increasing number of Wi-Fi devices will consume

more of your spectrum (Wi-Fi devices > humans)- S L O W networks are not user-friendly- Even unauthorized Wi-Fi devices consume spectrum as

they scan for Wi-Fi networks

• Solutions include- Selective site survey, mission-critical network design- Capacity planning, 802.11n APs- Intrusion detection systems, spectrum monitoring

Same goes for WAN and WWAN

Page 22: Security Considerations for  Mobile Devices

Gartner for Technical Professionals

(AKA “Know your platforms before adding more stuff”)

How do mobile security architectures compare?

Page 23: Security Considerations for  Mobile Devices

Android Security

• Type: End-user control• Key elements

- Linux process and file isolation- Permissions based

• Concerns:- Fragmentation of the platform over OEMs- Encryption support dependent on OEM- Content providers accessible by default- Many OSS components and uncurated

appstores may lead to malware- Permissions rely on people’s judgment

23

Page 24: Security Considerations for  Mobile Devices

iOS Security

• Type: Walled garden• Key elements:

- Curated Appstore - Sandboxing- Hardware encryption, always on- OTA updates

• Concerns:- Vulnerabilities in OS that lead to jailbreak- Few mechanisms that limit the access of an app- Data protection not used by all applications and not validated

24

Page 25: Security Considerations for  Mobile Devices

BlackBerry Security

• Type: Guardian• Key elements

- Best in class mobile management and security

- Data protection capabilities- No jailbreaks for BB smartphones

• Concerns- AppWorld is vetted but its use not mandated,

leading to potential for malware- Apps may have extensive access, without

jailbreak- Management is critical, e.g. encryption is

optional

25

Page 26: Security Considerations for  Mobile Devices

Application Controls for Various PlatformsPlatform Application

testingCentralized signing Application

control on the device

Third-party anti-malware

productsBlackBerry Yes, but applications

can be offered outside of App World

Yes, but the requirement to check the signature is

configurable

Yes Yes

iPhone Yes Yes Limited to major applications

No

Windows Phone 6.x

Yes Yes, but the requirement to check the signature is

configurable

Available through third-party products or

System Center

Yes

Windows Phone 7

Yes Yes, but the requirement to check the signature is

configurable

No No

Symbian Yes Yes Available through third-party products

Yes

Android Limited – some app stores perform testing

but apps available outside of app stores

No No Yes

Page 27: Security Considerations for  Mobile Devices

Gartner for Technical Professionals

Recommendations

Page 28: Security Considerations for  Mobile Devices

Recommendations

Understand the risks and the threats you are trying to protect against and accept that some risks cannot be mitigated

Limit support to handhelds that satisfy minimal security requirements

Balance UX with security and connectivityUsers will go around security if you don’t have a good UX

Conduct data analysis to determine what is acceptable on the device and what is not

Deal with related infrastructure issues: network, authentication, provisioning, …

Page 29: Security Considerations for  Mobile Devices

Recommended Gartner Research

Comparing Security Controls for Handheld DevicesMario de Boer, Eric Maiwald, 22 January 2012

Decision Point for Mobile Endpoint SecurityEric Maiwald

Client Virtualization: Reducing Malware and Information SprawlMario de Boer, Dan Blum

Solution Path: How to Create a Mobile ArchitecturePaul Debeasi

Field Research Summary: Mobility and SecurityEric Maiwald, 26 January 2012