Patrik Ekdahl Ericsson Research - Security Creating Security for BYOD Current Approaches Wednesday, April 17, 13
Patrik EkdahlEricsson Research - Security
Creating Security for BYODCurrent Approaches
Wednesday, April 17, 13
Ericsson External 2013-04-11
Bring Your Own Device
2
“BYOD refers to the act of employees using their personal mobile devices for work-related purposes.”
- Mason report 2012
• Consumerisation• IT departments are too slow to adopt.
• Personalisation• need for employees to feel unique.
• Work-life integration• traditional workday no longer exists.• drive for more flexible technology
solutions.
• Productivity enhancement• using familiar technologies• increased availability
• Cost
Drivers
Wednesday, April 17, 13
Ericsson External 2013-04-11
History
3
2000 20132007 2008
Blackberry 957 iPhone
2010
Several larger companies implement
BYOD policies
HTC Dream
2012
NIST draft on guidelines for
BYOD security.
Ericsson R380
Wednesday, April 17, 13
Ericsson External 2013-04-11
Corporate access
4
Blackberry style Corp. network
Internet
BES
Internet
Mail Server
Internet Gateway
VPN
Internal Data
Wednesday, April 17, 13
Ericsson External 2013-04-11
Corporate access
4
Blackberry style Corp. network
Internet
BES
Internet
Mail Server
Internet Gateway
VPN
Internal Data
WiFi-Browser
Wednesday, April 17, 13
Ericsson External 2013-04-11
Corporate access
5
Mobile Device Management style Corp. network
MDM Frontend
Exchange Server
MDM Application
Internal Data
Mail Calendar
Prop. Data Access
TLS
Wednesday, April 17, 13
Ericsson External 2013-04-11
Today’s landscape
6
Don’t know4%
No51%
Yes45%
IT’s support of BYOD (All devices, US SMEs)
Source: iGillottResearch 2013
0
5
10
15
20
25
100 75-99 51-74 50 26-49 1-25 0Don’t know
Percent of Employees Who Bring their own SmartPhone
RealityIn more than 90 % of the companies, people bring their own SmartPhone.
Wednesday, April 17, 13
Ericsson External 2013-04-11
Some more numbers..
7
of IT executives surveyed say that employees are using unsupported devices or apps because of personal preference, not because they need them to do critical work.
72%
(from a UniSys survey 2012)
Wednesday, April 17, 13
Ericsson External 2013-04-11
Some more numbers..
7
of IT executives surveyed say that employees are using unsupported devices or apps because of personal preference, not because they need them to do critical work.
72%
(from a UniSys survey 2012)
IT more likely to block Angry Birds than to provide secured alternatives to public cloud storage.
but what does IT know..? According to another survey..
Wednesday, April 17, 13
Ericsson External 2013-04-11
Some more numbers..
7
of IT executives surveyed say that employees are using unsupported devices or apps because of personal preference, not because they need them to do critical work.
72%
(from a UniSys survey 2012)
75% of IT organizations don't let people use their own apps for work purposes, with a substantial subset saying such usage should be grounds for dismissal.
IT more likely to block Angry Birds than to provide secured alternatives to public cloud storage.
but what does IT know..? According to another survey..
Wednesday, April 17, 13
Ericsson External 2013-04-11
Some more numbers..
7
of IT executives surveyed say that employees are using unsupported devices or apps because of personal preference, not because they need them to do critical work.
72%
(from a UniSys survey 2012)
75% of IT organizations don't let people use their own apps for work purposes, with a substantial subset saying such usage should be grounds for dismissal.
38% percent of the employees decided to ignore such edicts. These people are the ones who drive the business and tend to be in positions of authority.
IT more likely to block Angry Birds than to provide secured alternatives to public cloud storage.
but what does IT know..? According to another survey..
Wednesday, April 17, 13
Ericsson External 2013-04-11
Information owner model
8
Device owner Information owners
• Execute any apps they like. • Trust that data will not be viewed/erased by enterprise actions.• Detach from an enterprise without loosing personal data.
• Trust the device to • protect data• access data• process data• store data
• Terminate access to their data at any time
Device owner
Company
Bank
...
Wednesday, April 17, 13
Ericsson External 2013-04-11
Device architecture
9
HardwareContext
FirmwareContext
OSContext
ApplicationContexts
Application Processor, Baseband Processor, Memories, Peripherals, ROM Code
Bootloader, Initialization Code
Kernel
APP-1 APP-2 APP-3 APP-4 APP-5
Wednesday, April 17, 13
Ericsson External 2013-04-11
Information Domains
10
HardwareContext
FirmwareContext
OSContext
ApplicationContexts
Application Processor, Baseband Processor, Memories, Peripherals, ROM Code
Bootloader, Initialization Code
Kernel
APP-1 APP-2 APP-3 APP-4 APP-5
Wednesday, April 17, 13
Ericsson External 2013-04-11
Information Domains
10
HardwareContext
FirmwareContext
OSContext
ApplicationContexts
Application Processor, Baseband Processor, Memories, Peripherals, ROM Code
Bootloader, Initialization Code
Kernel
APP-1 APP-2 APP-3 APP-4 APP-5
InformationContexts
IO-2IO-1 IO-3 IO-4 IO-5
Wednesday, April 17, 13
Ericsson External 2013-04-11
Data access
11
ApplicationContexts
InformationContexts
IO-2IO-1 IO-3 IO-4 IO-5
APP-1 APP-2 APP-3 APP-4 APP-5
Wednesday, April 17, 13
Ericsson External 2013-04-11
Data access
11
ApplicationContexts
InformationContexts
IO-2IO-1 IO-3 IO-4 IO-5
APP-1 APP-2 APP-3 APP-4 APP-5
Wednesday, April 17, 13
Ericsson External 2013-04-11
Data access
11
ApplicationContexts
InformationContexts
IO-2IO-1 IO-3 IO-4 IO-5
APP-1 APP-2 APP-3 APP-4 APP-5
Policiesand a Policy Enforcement Engine (PEnE)
Wednesday, April 17, 13
Sealing the information
Ericsson External 2013-04-1112
Rich OS
APP-3APP-2APP-1
Policy Enf. Engine
IO-2IO-1 IO-3
Rich Environment Trusted Environment
Wednesday, April 17, 13
Sealing the information
Ericsson External 2013-04-1112
Rich OS
APP-3APP-2APP-1
Policy Enf. Engine
IO-2IO-1 IO-3
Rich Environment Trusted Environment
Wednesday, April 17, 13
Measuring
Ericsson External 2013-04-1113
Rich OS
APP-3APP-2APP-1
Policy Enf. Engine
IO-2IO-1 IO-3
Rich Environment Trusted Environment
Wednesday, April 17, 13
Measuring
Ericsson External 2013-04-1113
Rich OS
APP-3APP-2APP-1
Policy Enf. Engine
IO-2IO-1 IO-3
Rich Environment Trusted Environment
Wednesday, April 17, 13
Ericsson External 2013-04-11
Check point
14
Rich OS
APP-3APP-2APP-1
Policy Enf. Engine
IO-2IO-1 IO-3
Rich Environment Trusted Environment
Wednesday, April 17, 13
Ericsson External 2013-04-11
Check point
14
Rich OS
APP-3APP-2APP-1
Policy Enf. Engine
IO-2IO-1 IO-3
Rich Environment Trusted Environment
Execute any apps they like. Trust that data will not be viewed/erased by
enterprise actions. Detach from an enterprise without loosing
personal data.
Trust the device to protect data access data process data store data
Terminate access to their data at any time
Wednesday, April 17, 13
Ericsson External 2013-04-11
Trusted Applications
15
Rich OS
APP-3APP-2APP-1
Trusted Kernel(with PEnE)
TA-2TA-1 TA-3
Rich Environment Trusted Environment
Secure Storage
Wednesday, April 17, 13
Ericsson External 2013-04-11
Anchoring
16
Rich OS
APP-3APP-2APP-1
Rich Environment
Trusted Kernel(with PEnE)
TA-2TA-1 TA-3
Trusted Environment
Secure Storage
Wednesday, April 17, 13
Ericsson External 2013-04-11
Anchoring
16
Trusted Kernel(with PEnE)
TA-2TA-1 TA-3
Trusted Environment
Secure Storage
•Roots of trust•Execution•Storage•Verification•Reporting•Measurement•Isolation from Rich OS•Narrow well-defined API
Wednesday, April 17, 13
Ericsson External 2013-04-11
Management
17
Trusted Kernel(with PEnE)
TA-2TA-1 TA-3
Trusted Environment
Secure Storage
Wednesday, April 17, 13
Ericsson External 2013-04-11
Management
17
Rich OS
APP-3APP-2APP-1
Rich Environment
Trusted Kernel(with PEnE)
TA-2TA-1 TA-3
Trusted Environment
Secure Storage
Corporate Server
Administration data packages
•Install / uninstall•Key provisioning•State enquiring
Wednesday, April 17, 13
Ericsson External 2013-04-11
Management
17
Rich OS
APP-3APP-2APP-1
Rich Environment
Trusted Kernel(with PEnE)
TA-2TA-1 TA-3
Trusted Environment
Secure Storage
Corporate Server
Administration data packages
•Install / uninstall•Key provisioning•State enquiring
•TLS connection•Data fetch•State reporting
Wednesday, April 17, 13
Ericsson External 2013-04-11
Check point
18
Rich OS
APP-3APP-2APP-1
Trusted Kernel(with PEnE)
TA-2TA-1 TA-3
Rich Environment Trusted Environment
Secure Storage
Wednesday, April 17, 13
Ericsson External 2013-04-11
Check point
18
Rich OS
APP-3APP-2APP-1
Trusted Kernel(with PEnE)
TA-2TA-1 TA-3
Rich Environment Trusted Environment
Secure Storage
Execute any apps they like. Trust that data will not be viewed/erased by
enterprise actions. Detach from an enterprise without loosing
personal data.
Trust the device to protect data access data process data store data
Terminate access to their data at any time
Wednesday, April 17, 13
Ericsson External 2013-04-11
Conclusions
20
Using a Trusted Execution Environment we can build a owner-controlled BYOD solution
with hardware anchored trust.
•Non-proprietary solution exists•Multiple stakeholders•Device Owner is in control•No need for BES•Hardware anchored separation•Information•Execution•Remote administration
Wednesday, April 17, 13