34
Cesare Garlati VP Consumerization & Mobile Security – Trend Micro Co-Chair Mobile Group – Cloud Security Alliance APPNATION – December, 2012 The State of Security in The Mobile Enterprise

APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati

Cesare Garlati

VP Consumerization & Mobile Security – Trend Micro

Co-Chair Mobile Group – Cloud Security Alliance

APPNATION – December, 2012

The State of Security in The Mobile Enterprise

Page 2: APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati

Cloud Security Alliance: Mobile Guidance V1

Security Guidance forCritical Areas of Mobile Computing

Mobile Computing Definition

Threats to Mobile Computing

Maturity of the Mobile Landscape

BYOD Policies

Mobile Authentication

App Stores

Mobile Device Management

https://cloudsecurityalliance.org/research/mobile/

Page 3: APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati

CSA Top Mobile Threats – Evil 8

1. Data loss from lost, stolen or decommissioned devices.

2. Information-stealing mobile malware.

3. Data loss and data leakage through poorly written third-party apps.

4. Vulnerabilities within devices, OS, design and third-party applications.

5. Unsecured Wi-Fi, network access and rogue access points.

6. Unsecured or rogue marketplaces.

7. Insufficient management tools, capabilities and access to APIs.

8. NFC and proximity-based hacking.

Page 4: APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati

Raimund GenesChief Technology Officer, Trend Microhttp://trendmicro.com/our-contributors/raimund-genes

Chris SilvaIndustry Analyst, Altimeter Grouphttp://www.altimetergroup.com/about/team/chris-silva

Nigel Stanley Practice Leader, Bloor Researchhttp://www.bloorresearch.com/about/people/nigel-stanley.html

Philippe WinthropManaging Director, Enterprise Mobility Foundationhttp://www.enterprisemobilitymatters.com/about.html

How Secure and Manageable?

http://trendmicro.com/cloud-content/us/pdfs/business/reports/rpt_enterprise_readiness_consumerization_mobile_platforms.pdf

Page 5: APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati

Security and Management Criteria

Page 6: APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati

Security and Management Criteria

Page 7: APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati

Security and Management Criteria

Page 8: APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati

Ratings By Category

Mobile

Technology

Gap

Page 9: APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati

Ratings By Mobile Platform

Consumer

Technology

Gap

Page 10: APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati

Mobile vulnerabilities are real

CVE-2012-0643 – Malicious code allows remote attackers to bypass sandbox restrictions and execute arbitrary code.

CVE-2012-0646 – Format string vulnerability in VPN allows remote attackers to execute arbitrary code via a crafted racoon configuration file.

CVE-2012-0642 – Integer underflow allows remote attackers to execute arbitrary code via a crafted catalog file in an HFS disk image.

Android Apple iOS

CVE-2012-3979 – log_print function, allowing remote attackers to execute arbitrary code via a crafted web page that calls the JavaScript dump function.

CVE-2011-3874 – Stack-based buffer overflow in libsysutils allows user-assisted remote attackers to execute arbitrary code via an application call.

CVE-2011-4276 – Bluetooth service allows remote attackers within range to obtain contact data via an AT phonebook transfer.

Source: National Vulnerability Database via CVEDetails.com – as of October 4, 2012

Page 11: APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati

No Platform is immune: Apple iOS Detail

Source: National Vulnerability Database via CVEDetails.com – as of October 4, 2012

Page 12: APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati

Apple iOS Jailbreaking Trends

June 2007iPhone

July 2008iPhone 3G

July 2009iPhone 3GS

June 2010iPhone 4

Oct 2011iPhone 4S

Sept 2012iPhone 5

Source: Google Trends – as of October 4, 2012

Page 13: APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati

Android is the most exploited

Source: Trend Labs, Trend Micro Inc. – as of Q2 2012

Page 14: APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati

Malicious Apps on Legit Marketplace

March 2011 – 58 malicious apps (approx 250,000 victims)

May 2011 – 24 malicious apps (up to 120,000 victims)

December 2011 – 27 malicious apps (approx 14,000 victims).

February 2012 – 37 “Fan Apps” stealing handset information and aggressive advertising

August 2012 – many, many more …

Page 15: APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati

Android Versions Distribution

Source: Google http://developer.android.com/resources/dashboard/platform-versions – as of August1, 2012

73%

Fragmentation

Vulnerable Devices

Page 16: APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati

Mobility is not the problem

“Consumerization will be the most significant trend affecting IT during the next 10 years” Gartner

New technology emerges first in the consumer market and then spreads into business organizations brought in by the employees

IT and consumer electronics converge as individuals rely on the same devices and applications for personal use and work-related activities

Overwhelmed by the wave of consumer technology flooding the enterprise, IT managers lose control and struggle to enforce policies

Page 17: APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati

Source: Trend Micro Global Survey IT Managers, 500+ Employees, February 2012

ConsumerizationReport©

Page 18: APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati

Source: Trend Micro Global Survey IT Managers, 500+ Employees, February 2012

ConsumerizationReport©

BlackBerry

Android

Windows Ph

Apple iOS

Other

71%

68%

53%

51%

25%

"What mobile platforms are allowed by your BYOD policy?"

Apple iOS

BlackBerry

Android

Windows Ph

Other

20%

19%

18%

14%

15%

"Rank security and manageability of each mobile operating system"

Security

Data Loss

Compliance

Personal Data

Privacy

64%

59%

43%

41%

40%

BYOD Top 5 concerns

49%

5%

47%

"Has your company ever experienced a security breach as result of BYOD?"

Yes

Don't Know

No

Page 19: APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati

• Consumer mobile technology is invading the enterprise and you won’t be able to resist it

• Consumer technology is not as secure as manageable as required by the enterprise

• No platform is immune from attack, although some are safer than others

Embrace Consumerization1

Understand the risk profile of the various platforms2

Deploy new security and management tools3

You are not ready for this

Page 20: APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati

Thank You!Cesare Garlati

http://BringYourOwnIT.com

Page 21: APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati

Cesare Garlati

As VP of Mobile Security at Trend Micro, Cesare Garlati serves as the evangelist for the enterprise mobility product line. Cesare is responsible for raising awareness of Trend Micro’s vision for security solutions in an increasingly consumerized IT world.

Prior to Trend Micro, Mr. Garlati held director positions within leading mobility companies such as iPass, Smith Micro Software and WaveMarket – now LocationLabs. Prior to this, he was senior manager of product development at Oracle, where he led the development of Oracle’s first cloud application and many other modules of the Oracle E-Business Suite.

Cesare holds an MBA from U.C. Berkeley, a BS in Computer Science and professional certifications from Microsoft, Cisco and Sun. Cesare is Chair of Trend Micro Advisory Board for Consumerization and Mobile and Co-Chair of the CSA Mobile Working Group.

Blog: http://BringYourOwnIT.com

Cesare Garlati | Vice PresidentConsumerization & Mobile Security Blog: BringYourOwnIT.comlinkedin/in/CesareGarlati twitter/CesareGarlati [email protected]

Skype: Cesare.GarlatiMobile: +1 408.667.3320

Page 22: APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati

http://consumerization.com

Page 23: APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati

http://consumerization.trendmicro.com

Page 24: APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati

http://BringYourOwnIT.com

Page 25: APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati

http://youtube.com/user/BringYourOwnIT

Page 26: APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati

ConsumerizationReport©

Android iOS Win Ph RIM Symbian Other

Series1 0.3795098198643

59

0.1737500671052

38

0.0337722170903

226

0.1169934680654

97

0.2645287924807

3

0.0314456353938

564

5%

15%

25%

35%

45%

55%

Installed Base % 4Q11

Android iOS Win Ph RIM Symbian Other

Se-ries1

0.518592677538

7

0.190085981702

497

0.207006215213

87

0.057089286748

0719

0 0.019703081228

0377

Installed Base % 2015*

59% 92%

X

Android and iOS will account for over 70% of smartphone sales by the end of 2012. Microsoft will rise to third place in the global OS rankings by 2013, ahead of Research In Motion.

Source: Trend Micro internal analysis based on Gartner, Forrester and IDC market data – February, 28 2012

Page 27: APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati

How To: Jailbreak iOS (5.1.1)

Xxxxx 2.0 supports the following devices on 5.1.1:iPad 1, iPad 2, iPad 3 (iPad2,4 is now supported as of Xxxxx 2.0.4)iPhone 3GS, iPhone 4, iPhone 4SiPod touch 3rd generation, iPod touch 4th generation

How To Use Xxxxx 2.0:1. Make a backup of your device in iTunes by right clicking on your device name under

the ‘Devices’ menu and click ‘Back Up’.2. Open Xxxxx and be sure you are still connected via USB cable to your computer.3. Click ‘Jailbreak’ and wait…. just be patient and do not disconnect your device.4. Once jailbroken return to iTunes and restore your backup from earlier.

Download LinksXxxx v2.0.4 MacOSX (10.5, 10.6, 10.7)Xxxx v2.0.4 Windows (XP/Vista/Win7)Xxxx v2.0.4 Linux (x86/x86_64)

Page 28: APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati

Taller screens like Cydia too. :)

@saurik – Jay Freeman

Cydia: 1.5M Apps per day

5% to 10% of Apple iOS devices

$8M rev 2011 (to developers)

Page 29: APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati

Apple iOS Jailbreaking Trends – U.S.

Source: Google Trends – as of October 4, 2012

June 2007iPhone

July 2008iPhone 3G

July 2009iPhone 3GS

June 2010iPhone 4

Oct 2011iPhone 4S

Sept 2012iPhone 5

Page 30: APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati

Malicious Apps on Legit Marketplace

Page 31: APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati

Android Commercial Spy Apps

Page 32: APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati

3D Porsche Sports Car HD Live Wallpapers

Page 33: APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati

VScan:AndroidOS_ADWLeadbolt.HRY

Page 34: APPNATION IV - The State of Security in the Mobile Enterprise - Cesare Garlati

Source: Federal Bureau Of Investigation – New E-Scams & Warnings – 10/12/2012

FBI Warns of Mobile Malware Risks