Lesson 13 Flashcards
Mobile Device Deployment Models
- Bring your own device (BYOD)
- Corporate owned, business only (COBO)
- Corporate owned, personally-enabled (COPE)
- Choose your own device (CYOD)
- Virtual desktop infrastructure (VDI)
BYOD
•Bring your own device (BYOD)
COBO
•Corporate owned, business only (COBO)
CYOD
•Choose your own device (CYOD)
VDI
•Virtual desktop infrastructure (VDI)
EMM
Enterprise mobility management (EMM) is a class of management software designed
to apply security policies to the use of mobile devices and apps in the enterprise. The
challenge of identifying and managing attached devices is often referred to as visibility.
EMM software can be used to manage enterprise-owned devices as well as BYOD.
There are two main functions of an EMM product suite:
• Mobile device management (MDM)—sets device policies for authentication,
feature use (camera and microphone), and connectivity. MDM can also allow device
resets and remote wipes.
• Mobile application management (MAM)—sets policies for apps that can process
corporate data, and prevents data transfer to personal apps. This type of solution
configures an enterprise-managed container or workspace.
Visibility
The
challenge of identifying and managing attached devices is often referred to as visibility.
EMM software can be used to manage enterprise-owned devices as well as BYOD.
Mobile device management (MDM)
sets device policies for authentication,
feature use (camera and microphone), and connectivity. MDM can also allow device
resets and remote wipes.
Mobile application management (MAM)
sets policies for apps that can process
corporate data, and prevents data transfer to personal apps. This type of solution
configures an enterprise-managed container or workspace.
Unified endpoint management (UEM)
Additionally, distinguishing whether client endpoints are mobile or fixed is not really
a critical factor for many of these management tasks, with the consequence that
the latest suites aim for visibility across PC, laptop, smartphone, tablet, and even IoT
devices. These suites are called unified endpoint management (UEM) (redmondmag.
com/Articles/2017/10/01/Unified-Endpoint-Management.aspx).
The core functionality of endpoint management suites extends the concept of
network access control (NAC) solutions. The management software logs the use of a
device on the network and determines whether to allow it to connect or not, based
on administrator-set parameters. When the device is enrolled with the management
software, it can be configured with policies to allow or restrict use of apps, corporate
data, and built-in functions, such as a video camera or microphone.
Device enrollment program, Volume Purchase Program and develper Enterprise program
Corporatecontrol over iOS devices and distribution of corporate and B2B (Business-to-Business)
apps is facilitated by participating in the Device Enrollment Program the Volume Purchase Program, and the Developer Enterprise Program
ios risks
There remains the risk that a vulnerability in either iOS or an app
could be discovered and exploited. In this event, users would need to update iOS or the
app to a version that mitigates the exploit.
SEAndroid
SEAndroid
(source.android.com/security/selinux) uses mandatory access control (MAC) policies to
run apps in sandboxes. When the app is installed, access is granted (or not) to specific
shared features, such as contact details, SMS texting, and email.
Mobile Access Control Systems
Smartphone authentication •Password •PIN •Swipe pattern •Biometric
Screen lock
Context-aware authentication
Context-Aware Authentication
It is also important to consider newer authentication models, such as context-aware
authentication. For example, smartphones now allow users to disable screen locks
when the device detects that it is in a trusted location, such as the home. Conversely,
an enterprise may seek more stringent access controls to prevent misuse of a device.
For example, even if the device has been unlocked, accessing a corporate workspace
might require the user to authenticate again. It might also check whether the network
connection can be trusted (that it is not an open Wi-FI hotspot, for instance).
Remote wiop
- “Kill switch”
- Sets device to factory defaults or clears storage (or storage segment)
- Initiated from enterprise management software
- Thief might be able to keep device from receiving the wipe command
MicroSD HSM
MicroSD HSM is a small form factor hardware security module designed to store
cryptographic keys securely. This allows the cryptographic material to be used with
different devices, such as a laptop and smartphone.
Full Device Encryption and External Media
iOS device encryption
•Secure erase encryption
•Data protection
Android device encryption
•From version 10, only uses file-level encryption of user data
External media
MicroSD HSM
Geolocation
Geolocation is the use of network attributes to identify (or estimate) the physical
position of a device. The device uses location services to determine its current position.
Location services can make use of two systems:
• Global Positioning System (GPS)—a means of determining the device’s latitude and
longitude based on information received from satellites via a GPS sensor.
• Indoor Positioning System (IPS)—works out a device’s location by triangulating
its proximity to other radio sources, such as cell towers, Wi-Fi access points, and
Bluetooth/RFID beacons.
GPS vs IPS
• Global Positioning System (GPS)—a means of determining the device’s latitude and
longitude based on information received from satellites via a GPS sensor.
• Indoor Positioning System (IPS)—works out a device’s location by triangulating
its proximity to other radio sources, such as cell towers, Wi-Fi access points, and
Bluetooth/RFID beacons.
Primary concern for geolocation
privacy
Geofencing
Geofencing to apply location-based policies automatically
•Disable on-board camera/video through MDM/EMM controls
Geofencing is the practice of creating a virtual boundary based on real-world
geography. Geofencing can be a useful tool with respect to controlling the use of
camera or video functions or applying context-aware authentication. An organization
may use geofencing to create a perimeter around its office property, and subsequently,
limit the functionality of any devices that exceed this boundary. An unlocked
smartphone could be locked and forced to re-authenticate when entering the
premises, and the camera and microphone could be disabled. The device’s position is
obtained from location services.
GPS tagging
GPS tagging is the process of adding geographical identification metadata, such
- Risksto personal information
- Track movements (assist social engineering)
Mobile app management
- MDM/EMM application use policies
- Corporate workspaces
- Restricting third-party app stores
- Enterprise app development and fulfillment
- Sideloading
corporate workspaces
When a device is joined to the corporate network through enrollment with
management software, it can be configured into an enterprise workspace mode in
which only a certain number of authorized applications can run. (apple uses Apple Business Manager)
sideloading
Unlike iOS, Android allows for selection of different stores and installation of untrusted
apps from any third party, if this option is enabled by the user. With unknown sources
enabled, untrusted apps can be downloaded from a website and installed using the
.apk file format. This is referred to as sideloading.
Conversely, a management suite might be used to prevent the use of third-party stores
or sideloading and block unapproved app sources.
content managemnt
- Privately owned but corporate use issues
- Data ownership
- Privacy
- Containerization sets up a corporate workspace segmented from the employee’s private apps and data
- Storage segmentation ensures separation of data
- Enforcing content management/DLP policies
containerization
•Containerization sets up a corporate workspace segmented from the employee’s private apps and data