30
Ojas Rege, VP Strategy, MobileIron Professional Techniques – T13 Best Practices for Securing Mobile Content

Best Practices for Securing Mobile Contentsfisaca.org/images/FC14Presentations/T13.pdf · Securing SharePoint 2014 Fall Conference - "Think Big" 12 Secure Content Viewer REMOVE SharePoint

  • Upload
    others

  • View
    4

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Best Practices for Securing Mobile Contentsfisaca.org/images/FC14Presentations/T13.pdf · Securing SharePoint 2014 Fall Conference - "Think Big" 12 Secure Content Viewer REMOVE SharePoint

Ojas Rege, VP Strategy, MobileIron Professional Techniques – T13

Best Practices for Securing Mobile Content

Page 2: Best Practices for Securing Mobile Contentsfisaca.org/images/FC14Presentations/T13.pdf · Securing SharePoint 2014 Fall Conference - "Think Big" 12 Secure Content Viewer REMOVE SharePoint

Today’s session

Objectives

• Establish the link between mobile and content

• Outline the security considerations for mobile content

• Share best practices for content security

Agenda

• What is Mobile First?

• Content security use cases

• Baseline best practices

• Hacker threats and countermeasures

• Evolution of security model

2014 Fall Conference - "Think Big" 2

Page 3: Best Practices for Securing Mobile Contentsfisaca.org/images/FC14Presentations/T13.pdf · Securing SharePoint 2014 Fall Conference - "Think Big" 12 Secure Content Viewer REMOVE SharePoint

2014 Fall Conference - "Think Big" 3

Page 4: Best Practices for Securing Mobile Contentsfisaca.org/images/FC14Presentations/T13.pdf · Securing SharePoint 2014 Fall Conference - "Think Big" 12 Secure Content Viewer REMOVE SharePoint

2014 Fall Conference - "Think Big" 4

Page 5: Best Practices for Securing Mobile Contentsfisaca.org/images/FC14Presentations/T13.pdf · Securing SharePoint 2014 Fall Conference - "Think Big" 12 Secure Content Viewer REMOVE SharePoint

2014 Fall Conference - "Think Big" 5 5

Definition…

Mobile First organizations embrace mobility as their primary IT platform

in order to transform their businesses and increase their competitiveness.

Content of all types is easily and securely

available on any device

CONTENT

End users choose their devices

Security is invisible to end users

User experience is the #1 design criteria

USER EXPERIENCES

New apps are developed and

delivered to mobile devices first

Core business processes can be performed on

any device

APPLICATIONS

In a Mobile First Company…

Page 6: Best Practices for Securing Mobile Contentsfisaca.org/images/FC14Presentations/T13.pdf · Securing SharePoint 2014 Fall Conference - "Think Big" 12 Secure Content Viewer REMOVE SharePoint

Traditional enterprise security

2014 Fall Conference - "Think Big" 6

Firewall & VPN

Page 7: Best Practices for Securing Mobile Contentsfisaca.org/images/FC14Presentations/T13.pdf · Securing SharePoint 2014 Fall Conference - "Think Big" 12 Secure Content Viewer REMOVE SharePoint

The perimeter is gone

2014 Fall Conference - "Think Big" 7

Copy/Paste

Open-in

Forward

Page 8: Best Practices for Securing Mobile Contentsfisaca.org/images/FC14Presentations/T13.pdf · Securing SharePoint 2014 Fall Conference - "Think Big" 12 Secure Content Viewer REMOVE SharePoint

2014 Fall Conference - "Think Big" 8

“The more the CIO says ‘No,’ the less secure the organization becomes.”

Vivek Kundra CIO, United States, February 2011

“Responsible, not restrictive.”

Mike Brannon National Gypsum

Page 9: Best Practices for Securing Mobile Contentsfisaca.org/images/FC14Presentations/T13.pdf · Securing SharePoint 2014 Fall Conference - "Think Big" 12 Secure Content Viewer REMOVE SharePoint

Securing data-at-rest

2014 Fall Conference - "Think Big" 9

Page 10: Best Practices for Securing Mobile Contentsfisaca.org/images/FC14Presentations/T13.pdf · Securing SharePoint 2014 Fall Conference - "Think Big" 12 Secure Content Viewer REMOVE SharePoint

Two primary document repositories

2014 Fall Conference - "Think Big" 10

Open In Copy

Save View

SharePoint documents

Open In Copy

Save View

Email attachments

MobileIron Confidential 10

• Solve “open in” problem

• Store documents securely on device

• Control cut / copy / paste actions

• Selectively wipe documents

• Prevent unauthorized distribution

• Control end-to-end with policy

• Leverage existing content repositories

Page 11: Best Practices for Securing Mobile Contentsfisaca.org/images/FC14Presentations/T13.pdf · Securing SharePoint 2014 Fall Conference - "Think Big" 12 Secure Content Viewer REMOVE SharePoint

Securing email attachments

2014 Fall Conference - "Think Big" 11

Email App Secure Content Viewer

Email with Attachment

REMOVE

Page 12: Best Practices for Securing Mobile Contentsfisaca.org/images/FC14Presentations/T13.pdf · Securing SharePoint 2014 Fall Conference - "Think Big" 12 Secure Content Viewer REMOVE SharePoint

Securing SharePoint

2014 Fall Conference - "Think Big" 12

Secure Content Viewer

REMOVE

SharePoint

Page 13: Best Practices for Securing Mobile Contentsfisaca.org/images/FC14Presentations/T13.pdf · Securing SharePoint 2014 Fall Conference - "Think Big" 12 Secure Content Viewer REMOVE SharePoint

Closed loop actions when compromised

2014 Fall Conference - "Think Big" 13

Remediation

Notify

Block Quarantine

Closed-loop actions

• Notify user and admin • Prevent access • Remove saved files • Remove SharePoint config • Protect enterprise persona

Page 14: Best Practices for Securing Mobile Contentsfisaca.org/images/FC14Presentations/T13.pdf · Securing SharePoint 2014 Fall Conference - "Think Big" 12 Secure Content Viewer REMOVE SharePoint

Best practices for data loss prevention

2014 Fall Conference - "Think Big" 14

Closed-loop compliance

Continuous management

OS integrity

OS versioning

Passcode / encryption

Auto-wipe

Identity

Secure tunnel

Attachment protection

Secure content hub

Role of cloud

Credible ecosystem

Page 15: Best Practices for Securing Mobile Contentsfisaca.org/images/FC14Presentations/T13.pdf · Securing SharePoint 2014 Fall Conference - "Think Big" 12 Secure Content Viewer REMOVE SharePoint

Security considerations 2014+

2014 Fall Conference - "Think Big" 15

“No” not a sustainable option -> provide credible alternatives

Massive content ecosystem -> crowd-source but don’t lock-in

Uncertain economics -> establish “help-yourself-desk”

Dynamic risk at endpoint -> automate your mobile trust model

Content always one-click from cloud -> co-habitate responsibly

Blurring between content and app -> explore new forms

Page 16: Best Practices for Securing Mobile Contentsfisaca.org/images/FC14Presentations/T13.pdf · Securing SharePoint 2014 Fall Conference - "Think Big" 12 Secure Content Viewer REMOVE SharePoint

Content does not exist in isolation

2014 Fall Conference - "Think Big" 16

Enterprise Mobile Persona

Native experience

Data separation

Shared policy Selective wipe

Secure communications

Email

Apps Certs

Policy

Content

Federated identity

Page 17: Best Practices for Securing Mobile Contentsfisaca.org/images/FC14Presentations/T13.pdf · Securing SharePoint 2014 Fall Conference - "Think Big" 12 Secure Content Viewer REMOVE SharePoint

Journey to the Mobile First enterprise

2014 Fall Conference - "Think Big" 17

Device Security BYOD (user choice) Email access (secure ActiveSync) Multi-OS security (BlackBerry replacement)

App & Content Enablement

1st gen of mobile apps Mobile docs (SharePoint) Cloud protections

Business Transformation

New user & business experiences

Page 18: Best Practices for Securing Mobile Contentsfisaca.org/images/FC14Presentations/T13.pdf · Securing SharePoint 2014 Fall Conference - "Think Big" 12 Secure Content Viewer REMOVE SharePoint

2014 Fall Conference - "Think Big“ October 13-15, 2014

18

Hacker culture

Page 19: Best Practices for Securing Mobile Contentsfisaca.org/images/FC14Presentations/T13.pdf · Securing SharePoint 2014 Fall Conference - "Think Big" 12 Secure Content Viewer REMOVE SharePoint

Motivations

2014 Fall Conference - "Think Big" 19

Joining the “elite” – Show technical prowess – Publish that exploit first

A poke in the eye of bureaucracy

– “Big Business” – “Big Government”

Criminal intent

– Corporate espionage – Money or credit card numbers

Payback for wrong deed – Revenge!

Rule the world!

Page 20: Best Practices for Securing Mobile Contentsfisaca.org/images/FC14Presentations/T13.pdf · Securing SharePoint 2014 Fall Conference - "Think Big" 12 Secure Content Viewer REMOVE SharePoint

World has changed – for IT and hacker

2014 Fall Conference - "Think Big" 20

Server

Users

“SECURE” INTERNAL NETWORK

Network edge has blurred

New gen operating systems are sandboxed

User is low-hanging fruit

Page 21: Best Practices for Securing Mobile Contentsfisaca.org/images/FC14Presentations/T13.pdf · Securing SharePoint 2014 Fall Conference - "Think Big" 12 Secure Content Viewer REMOVE SharePoint

Mobile attack vectors

2014 Fall Conference - "Think Big" 21

User

Device

Admin

Wireless

Network

User data leakage Copy/paste, open in, etc. lead to leaks from

well-intentioned users. Spyware and malware

Data is harvested and sent to malicious site.

Jailbreak / root Device is opened to

vulnerabilities leading to data exposure.

Unprotected networks Rogue access point, man-in-the-

middle, etc. capture data.

Page 22: Best Practices for Securing Mobile Contentsfisaca.org/images/FC14Presentations/T13.pdf · Securing SharePoint 2014 Fall Conference - "Think Big" 12 Secure Content Viewer REMOVE SharePoint

Countermeasures framework

2014 Fall Conference - "Think Big" 22

Secure, isolated tunnel separates and protects

work app traffic.

Quarantine of jailbroken and rooted devices (online & offline) prevent ongoing threat.

Data loss prevention (DLP) controls mitigate device vulnerabilities and prevent well-intentioned users from leaking corporate data.

Containerization and app reputation services protect against risky apps

without unnecessary limitations on app downloads.

Sentry gateway prevents unauthorized devices and apps

from gaining access. Secure email attachments enforce DLP and mitigate device vulnerabilities.

Certificates thwart open Wi-Fi MiTM attacks.

Ensures appropriate cryptographic use.

User

Device

Admin

Wireless

Network

Page 23: Best Practices for Securing Mobile Contentsfisaca.org/images/FC14Presentations/T13.pdf · Securing SharePoint 2014 Fall Conference - "Think Big" 12 Secure Content Viewer REMOVE SharePoint

The new enterprise IT architecture

2014 Fall Conference - "Think Big" 23

Personal Cloud Services

ENABLE

Enterprise Cloud Services

EMBRACE

Private IT Infrastructure

EXTEND

Page 24: Best Practices for Securing Mobile Contentsfisaca.org/images/FC14Presentations/T13.pdf · Securing SharePoint 2014 Fall Conference - "Think Big" 12 Secure Content Viewer REMOVE SharePoint

Circle of trust

2014 Fall Conference - "Think Big" 24

User

App

Repository Device

Page 25: Best Practices for Securing Mobile Contentsfisaca.org/images/FC14Presentations/T13.pdf · Securing SharePoint 2014 Fall Conference - "Think Big" 12 Secure Content Viewer REMOVE SharePoint

Evolution of IT: Agility is the new security

2014 Fall Conference - "Think Big" 25

What factors would most

contribute to your

organization’s ability to

maintain an effective

mobile strategy over time?

Agility and preparedness for change

Ample resources

Enabling technologies

Knowledgeable or expert staff

Collaboration among business units

Effective leadership

A strong mobile security posture

6.58

6.01

5.60

5.13

4.24

3.97

2.61

Most important factors for mobile success

(7 = most important to 1 = least important)

Source: Ponemon Institute, March 2014

Page 26: Best Practices for Securing Mobile Contentsfisaca.org/images/FC14Presentations/T13.pdf · Securing SharePoint 2014 Fall Conference - "Think Big" 12 Secure Content Viewer REMOVE SharePoint

2014 Fall Conference - "Think Big" 26

MobileIron Global User Conference

June 17-20, 2014

San Francisco

Attendee profile

68% have a BYOD program

71% use identity certificates

73% have an enterprise app store

70% have deployed Android

37% use API for integration

55% will EOL BlackBerry by end of year

Page 27: Best Practices for Securing Mobile Contentsfisaca.org/images/FC14Presentations/T13.pdf · Securing SharePoint 2014 Fall Conference - "Think Big" 12 Secure Content Viewer REMOVE SharePoint

2014 Fall Conference - "Think Big" 27

Past

technology

transitions

Mainframe

Era

1960+

PC

Era

1980+

Internet

Era

1995+

Change the

way people work

Disrupt enterprise

architectures

Create opportunities

for innovation

Mobile First

Era

2010+

Major technology and business transition

Page 28: Best Practices for Securing Mobile Contentsfisaca.org/images/FC14Presentations/T13.pdf · Securing SharePoint 2014 Fall Conference - "Think Big" 12 Secure Content Viewer REMOVE SharePoint

2014 Fall Conference - "Think Big" 28

Mobility unlocks human potential in the workplace

Page 29: Best Practices for Securing Mobile Contentsfisaca.org/images/FC14Presentations/T13.pdf · Securing SharePoint 2014 Fall Conference - "Think Big" 12 Secure Content Viewer REMOVE SharePoint

2014 Fall Conference - "Think Big" 29

End user IT

Enterprise

Resources

AppConnect

ecosystem

Secure apps

Apps@Work Enterprise app store

Docs@Work Secure content

Web@Work Secure browsing

Help@Work Remote troubleshooting

Tunnel Per app VPN

DataView Cost management

Insight Mobile admin app

Sentry Intelligent gateway

Core Management

console

Reporting & analytics

tools

AppDN App delivery network

MobileIron: Purpose-built architecture for enterprise security and management

Page 30: Best Practices for Securing Mobile Contentsfisaca.org/images/FC14Presentations/T13.pdf · Securing SharePoint 2014 Fall Conference - "Think Big" 12 Secure Content Viewer REMOVE SharePoint

2014 Fall Conference - "Think Big" 30

Thank you!

Ojas Rege [email protected] @orege (twitter)