Top Banner
Patrik Ekdahl Ericsson Research - Security Creating Security for BYOD Current Approaches Wednesday, April 17, 13
35

Creating Security for BYOD – Current Approaches - SICS

Feb 09, 2022

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Creating Security for BYOD – Current Approaches - SICS

Patrik EkdahlEricsson Research - Security

Creating Security for BYODCurrent Approaches

Wednesday, April 17, 13

Page 2: Creating Security for BYOD – Current Approaches - SICS

Ericsson External 2013-04-11

Bring Your Own Device

2

“BYOD refers to the act of employees using their personal mobile devices for work-related purposes.”

- Mason report 2012

• Consumerisation• IT departments are too slow to adopt.

• Personalisation• need for employees to feel unique.

• Work-life integration• traditional workday no longer exists.• drive for more flexible technology

solutions.

• Productivity enhancement• using familiar technologies• increased availability

• Cost

Drivers

Wednesday, April 17, 13

Page 3: Creating Security for BYOD – Current Approaches - SICS

Ericsson External 2013-04-11

History

3

2000 20132007 2008

Blackberry 957 iPhone

2010

Several larger companies implement

BYOD policies

HTC Dream

2012

NIST draft on guidelines for

BYOD security.

Ericsson R380

Wednesday, April 17, 13

Page 4: Creating Security for BYOD – Current Approaches - SICS

Ericsson External 2013-04-11

Corporate access

4

Blackberry style Corp. network

Internet

BES

Internet

Mail Server

Internet Gateway

VPN

Internal Data

Wednesday, April 17, 13

Page 5: Creating Security for BYOD – Current Approaches - SICS

Ericsson External 2013-04-11

Corporate access

4

Blackberry style Corp. network

Internet

BES

Internet

Mail Server

Internet Gateway

VPN

Internal Data

WiFi-Browser

Wednesday, April 17, 13

Page 6: Creating Security for BYOD – Current Approaches - SICS

Ericsson External 2013-04-11

Corporate access

5

Mobile Device Management style Corp. network

MDM Frontend

Exchange Server

MDM Application

Internal Data

Mail Calendar

Prop. Data Access

TLS

Wednesday, April 17, 13

Page 7: Creating Security for BYOD – Current Approaches - SICS

Ericsson External 2013-04-11

Today’s landscape

6

Don’t know4%

No51%

Yes45%

IT’s support of BYOD (All devices, US SMEs)

Source: iGillottResearch 2013

0

5

10

15

20

25

100 75-99 51-74 50 26-49 1-25 0Don’t know

Percent of Employees Who Bring their own SmartPhone

RealityIn more than 90 % of the companies, people bring their own SmartPhone.

Wednesday, April 17, 13

Page 8: Creating Security for BYOD – Current Approaches - SICS

Ericsson External 2013-04-11

Some more numbers..

7

of IT executives surveyed say that employees are using unsupported devices or apps because of personal preference, not because they need them to do critical work.

72%

(from a UniSys survey 2012)

Wednesday, April 17, 13

Page 9: Creating Security for BYOD – Current Approaches - SICS

Ericsson External 2013-04-11

Some more numbers..

7

of IT executives surveyed say that employees are using unsupported devices or apps because of personal preference, not because they need them to do critical work.

72%

(from a UniSys survey 2012)

IT more likely to block Angry Birds than to provide secured alternatives to public cloud storage.

but what does IT know..? According to another survey..

Wednesday, April 17, 13

Page 10: Creating Security for BYOD – Current Approaches - SICS

Ericsson External 2013-04-11

Some more numbers..

7

of IT executives surveyed say that employees are using unsupported devices or apps because of personal preference, not because they need them to do critical work.

72%

(from a UniSys survey 2012)

75% of IT organizations don't let people use their own apps for work purposes, with a substantial subset saying such usage should be grounds for dismissal.

IT more likely to block Angry Birds than to provide secured alternatives to public cloud storage.

but what does IT know..? According to another survey..

Wednesday, April 17, 13

Page 11: Creating Security for BYOD – Current Approaches - SICS

Ericsson External 2013-04-11

Some more numbers..

7

of IT executives surveyed say that employees are using unsupported devices or apps because of personal preference, not because they need them to do critical work.

72%

(from a UniSys survey 2012)

75% of IT organizations don't let people use their own apps for work purposes, with a substantial subset saying such usage should be grounds for dismissal.

38% percent of the employees decided to ignore such edicts. These people are the ones who drive the business and tend to be in positions of authority.

IT more likely to block Angry Birds than to provide secured alternatives to public cloud storage.

but what does IT know..? According to another survey..

Wednesday, April 17, 13

Page 12: Creating Security for BYOD – Current Approaches - SICS

Ericsson External 2013-04-11

Information owner model

8

Device owner Information owners

• Execute any apps they like. • Trust that data will not be viewed/erased by enterprise actions.• Detach from an enterprise without loosing personal data.

• Trust the device to • protect data• access data• process data• store data

• Terminate access to their data at any time

Device owner

Company

Bank

...

Wednesday, April 17, 13

Page 13: Creating Security for BYOD – Current Approaches - SICS

Ericsson External 2013-04-11

Device architecture

9

HardwareContext

FirmwareContext

OSContext

ApplicationContexts

Application Processor, Baseband Processor, Memories, Peripherals, ROM Code

Bootloader, Initialization Code

Kernel

APP-1 APP-2 APP-3 APP-4 APP-5

Wednesday, April 17, 13

Page 14: Creating Security for BYOD – Current Approaches - SICS

Ericsson External 2013-04-11

Information Domains

10

HardwareContext

FirmwareContext

OSContext

ApplicationContexts

Application Processor, Baseband Processor, Memories, Peripherals, ROM Code

Bootloader, Initialization Code

Kernel

APP-1 APP-2 APP-3 APP-4 APP-5

Wednesday, April 17, 13

Page 15: Creating Security for BYOD – Current Approaches - SICS

Ericsson External 2013-04-11

Information Domains

10

HardwareContext

FirmwareContext

OSContext

ApplicationContexts

Application Processor, Baseband Processor, Memories, Peripherals, ROM Code

Bootloader, Initialization Code

Kernel

APP-1 APP-2 APP-3 APP-4 APP-5

InformationContexts

IO-2IO-1 IO-3 IO-4 IO-5

Wednesday, April 17, 13

Page 16: Creating Security for BYOD – Current Approaches - SICS

Ericsson External 2013-04-11

Data access

11

ApplicationContexts

InformationContexts

IO-2IO-1 IO-3 IO-4 IO-5

APP-1 APP-2 APP-3 APP-4 APP-5

Wednesday, April 17, 13

Page 17: Creating Security for BYOD – Current Approaches - SICS

Ericsson External 2013-04-11

Data access

11

ApplicationContexts

InformationContexts

IO-2IO-1 IO-3 IO-4 IO-5

APP-1 APP-2 APP-3 APP-4 APP-5

Wednesday, April 17, 13

Page 18: Creating Security for BYOD – Current Approaches - SICS

Ericsson External 2013-04-11

Data access

11

ApplicationContexts

InformationContexts

IO-2IO-1 IO-3 IO-4 IO-5

APP-1 APP-2 APP-3 APP-4 APP-5

Policiesand a Policy Enforcement Engine (PEnE)

Wednesday, April 17, 13

Page 19: Creating Security for BYOD – Current Approaches - SICS

Sealing the information

Ericsson External 2013-04-1112

Rich OS

APP-3APP-2APP-1

Policy Enf. Engine

IO-2IO-1 IO-3

Rich Environment Trusted Environment

Wednesday, April 17, 13

Page 20: Creating Security for BYOD – Current Approaches - SICS

Sealing the information

Ericsson External 2013-04-1112

Rich OS

APP-3APP-2APP-1

Policy Enf. Engine

IO-2IO-1 IO-3

Rich Environment Trusted Environment

Wednesday, April 17, 13

Page 21: Creating Security for BYOD – Current Approaches - SICS

Measuring

Ericsson External 2013-04-1113

Rich OS

APP-3APP-2APP-1

Policy Enf. Engine

IO-2IO-1 IO-3

Rich Environment Trusted Environment

Wednesday, April 17, 13

Page 22: Creating Security for BYOD – Current Approaches - SICS

Measuring

Ericsson External 2013-04-1113

Rich OS

APP-3APP-2APP-1

Policy Enf. Engine

IO-2IO-1 IO-3

Rich Environment Trusted Environment

Wednesday, April 17, 13

Page 23: Creating Security for BYOD – Current Approaches - SICS

Ericsson External 2013-04-11

Check point

14

Rich OS

APP-3APP-2APP-1

Policy Enf. Engine

IO-2IO-1 IO-3

Rich Environment Trusted Environment

Wednesday, April 17, 13

Page 24: Creating Security for BYOD – Current Approaches - SICS

Ericsson External 2013-04-11

Check point

14

Rich OS

APP-3APP-2APP-1

Policy Enf. Engine

IO-2IO-1 IO-3

Rich Environment Trusted Environment

Execute any apps they like. Trust that data will not be viewed/erased by

enterprise actions. Detach from an enterprise without loosing

personal data.

Trust the device to protect data access data process data store data

Terminate access to their data at any time

Wednesday, April 17, 13

Page 25: Creating Security for BYOD – Current Approaches - SICS

Ericsson External 2013-04-11

Trusted Applications

15

Rich OS

APP-3APP-2APP-1

Trusted Kernel(with PEnE)

TA-2TA-1 TA-3

Rich Environment Trusted Environment

Secure Storage

Wednesday, April 17, 13

Page 26: Creating Security for BYOD – Current Approaches - SICS

Ericsson External 2013-04-11

Anchoring

16

Rich OS

APP-3APP-2APP-1

Rich Environment

Trusted Kernel(with PEnE)

TA-2TA-1 TA-3

Trusted Environment

Secure Storage

Wednesday, April 17, 13

Page 27: Creating Security for BYOD – Current Approaches - SICS

Ericsson External 2013-04-11

Anchoring

16

Trusted Kernel(with PEnE)

TA-2TA-1 TA-3

Trusted Environment

Secure Storage

•Roots of trust•Execution•Storage•Verification•Reporting•Measurement•Isolation from Rich OS•Narrow well-defined API

Wednesday, April 17, 13

Page 28: Creating Security for BYOD – Current Approaches - SICS

Ericsson External 2013-04-11

Management

17

Trusted Kernel(with PEnE)

TA-2TA-1 TA-3

Trusted Environment

Secure Storage

Wednesday, April 17, 13

Page 29: Creating Security for BYOD – Current Approaches - SICS

Ericsson External 2013-04-11

Management

17

Rich OS

APP-3APP-2APP-1

Rich Environment

Trusted Kernel(with PEnE)

TA-2TA-1 TA-3

Trusted Environment

Secure Storage

Corporate Server

Administration data packages

•Install / uninstall•Key provisioning•State enquiring

Wednesday, April 17, 13

Page 30: Creating Security for BYOD – Current Approaches - SICS

Ericsson External 2013-04-11

Management

17

Rich OS

APP-3APP-2APP-1

Rich Environment

Trusted Kernel(with PEnE)

TA-2TA-1 TA-3

Trusted Environment

Secure Storage

Corporate Server

Administration data packages

•Install / uninstall•Key provisioning•State enquiring

•TLS connection•Data fetch•State reporting

Wednesday, April 17, 13

Page 31: Creating Security for BYOD – Current Approaches - SICS

Ericsson External 2013-04-11

Check point

18

Rich OS

APP-3APP-2APP-1

Trusted Kernel(with PEnE)

TA-2TA-1 TA-3

Rich Environment Trusted Environment

Secure Storage

Wednesday, April 17, 13

Page 32: Creating Security for BYOD – Current Approaches - SICS

Ericsson External 2013-04-11

Check point

18

Rich OS

APP-3APP-2APP-1

Trusted Kernel(with PEnE)

TA-2TA-1 TA-3

Rich Environment Trusted Environment

Secure Storage

Execute any apps they like. Trust that data will not be viewed/erased by

enterprise actions. Detach from an enterprise without loosing

personal data.

Trust the device to protect data access data process data store data

Terminate access to their data at any time

Wednesday, April 17, 13

Page 33: Creating Security for BYOD – Current Approaches - SICS

Ericsson External 2013-04-11

Standardization efforts

19Wednesday, April 17, 13

Page 34: Creating Security for BYOD – Current Approaches - SICS

Ericsson External 2013-04-11

Conclusions

20

Using a Trusted Execution Environment we can build a owner-controlled BYOD solution

with hardware anchored trust.

•Non-proprietary solution exists•Multiple stakeholders•Device Owner is in control•No need for BES•Hardware anchored separation•Information•Execution•Remote administration

Wednesday, April 17, 13

Page 35: Creating Security for BYOD – Current Approaches - SICS

21

Wednesday, April 17, 13