Mobile First Government

An analysis of NIST and DISA requirements for the adoption of commercially available mobility platforms by government agencies

August 2013

415 East Middlefield Road Mountain View, CA 94043 USA Tel. +1.650.919.8100 Fax +1.650.919.8006 [email protected]

1

Table of Contents

Overview ...... 3 Risk Assessment ...... 4 Lack of physical security controls ...... 4 Use of untrusted mobile devices ...... 4 Use of untrusted networks ...... 4 Use of applications ...... 5 Interaction with other systems ...... 5 Use of untrusted content ...... 5 Use of location services ...... 5 Management Capabilities – NIST Guidelines ...... 6 Category I: General policy ...... 6 Category II: Data communication and storage ...... 6 Category III: User and device authentication ...... 6 Category IV: Applications ...... 6 Detailed Mobile Device Management Requirements – DISA SRG ...... 7 Category I: General policy ...... 7 Category II: Data communication and storage ...... 9 Category III: User and device authentication ...... 11 Category IV: Applications ...... 12 Additional Capabilities of the MobileIron Platform...... 13 Access control...... 13 Data loss prevention (DLP) and application containerization ...... 14 Identity ...... 14 Secure tunneling ...... 14 Geographic security and expense...... 14 Secure content ...... 14 MobileIron Layered Security Model ...... 15 Summary ...... 16

2

Mobile First Government

The new generation of commercially available mobility platforms can provide extensive application development capabilities and strong user experiences at reasonable cost. This white paper outlines the security requirements that must be met for these platforms to be adopted by government agencies. It also details how the MobileIron solution can help meet these requirements. This white paper outlines We recommend reading the following resources for more details on requirements: the security requirements  DISA SRGs and STIGs for iOS, Android, and device management: for commercially available http://iase.disa.mil/stigs/net_perimeter/wireless/.html mobility platforms to be  NIST Guidelines for mobile device security: adopted by government http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-124r1.pdf agencies.

Overview

The National Institute for Standards and Technology (NIST), the Defense Information Systems Agency (DISA), and the General Services Administration (GSA) have been leading efforts to define requirements for enterprise mobility systems such as Mobile Device Management (MDM) and Mobile Application Management (MAM) for use in government agencies. Managing mobile devices Mobile devices, especially , are vulnerable to security breaches. They: and data is a complex topic  Are easily lost that requires an  Can be filled with unknown applications  Frequently communicate over untrusted networks understanding of  Are often purchased by users without consideration of IT standards and compliance policy, security requirements application vulnerabilities, trusted communication, Mobile Device Management (MDM) systems can help mitigate these vulnerabilities. secure storage, device But managing mobile devices and data is a complex topic that requires an authentication, remediation, understanding of compliance policy, application vulnerabilities, trusted and auditing. communications, secure storage, device authentication, remediation, and auditing.

This white paper describes the NIST and DISA requirements for Mobile Device Management (MDM). It:  Reviews the special risks of managing mobile devices from the NIST report Guidelines for Managing the Security of Mobile Devices in the Enterprise (NIST Special Publication 800-124 Revision 1) available at http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-124r1.pdf  Outlines the high-level capabilities that should be provided by MDM systems, as listed in the same document  Reviews a selection of the detailed MDM requirements from the DISA report Mobile Device Management (MDM) Server Security Requirements Guide (SRG) , Version 1, Release 1 (18 January 2013) available at http://iase.disa.mil/stigs/net_perimeter/wireless/u_mdm_srg_v1r1_srg.zip.  Describes how MobileIron’ s leading enterprise mobility management platform can help government organizations address these requirements

3

Risk Assessment

NIST provides a comprehensive overview of the risks associated with mobile devices in section 2.2 on pages 3-6 of NIST Special Publication 800-124 Revision 1, Guidelines for Managing the Security of Mobile Devices in the Enterprise. This section, titled “High-Level Threats and Vulnerabilities,” also highlights mitigation strategies.

The table below summarizes the contents of that section.

Table 1: Vulnerabilities and Mitigation Strategies from NIST SP 800-124 Revision 1 The National Institute for Vulnerability Mitigation Strategy Standards and Technology (NIST) has published a Lack of physical security controls comprehensive overview of the vulnerabilities and “…The devices’ mobile nature makes  Encrypt data stored on the device. mitigation strategies them much more likely to be lost or  Authenticate users attempting to associated with mobile stolen than other devices … access the device or resources devices: NIST Special [O]rganizations should assume that accessible through the device. Publication 800-124 mobile devices will be acquired by malicious parties who will attempt to Revision 1 “Guidelines for recover sensitive data either directly Managing and Securing from the devices themselves or indirectly Mobile Devices in the by using the devices to access the Enterprise.” organization’s remote resources.”

Use of untrusted mobile devices

“Many mobile devices, particularly those  Restrict or prohibit BYOD devices. that are personally owned (bring your  Fully secure each organization- own device, BYOD), are not necessarily issued phone before allowing it to be trustworthy. Current mobile devices lack used. the root of trust features (e.g.,  Employ “technical solutions for TPMs)...There is also frequent achieving degrees of trust, such as jailbreaking and rooting of mobile running the organization’s software devices, which means that the built-in in a secure, isolated sandbox on the restrictions on security, operating system phone, or using device integrity use, etc. have been bypassed…” scanning applications.”

Use of untrusted networks

“…Communications systems…such as  Encrypt communications. Wi-Fi and cellular networks…are  Establish mutual authentication to susceptible to eavesdropping, which verify the identities of endpoints. places sensitive information transmitted at risk of compromise. Man-in-the-middle attacks may also be performed to intercept and modify communications...”

4

Use of applications

“Mobile devices are designed to make it rd  Prohibit installation of 3 -party apps. easy to find, acquire, install, and use  Implement whitelisting to prohibit third-party applications…Organizations installation of unapproved apps. should plan their mobile device security  Implement a secure sandbox to on the assumption that unknown third- isolate government data and apps party mobile device applications from all other data and apps. downloadable by users should not be  Prohibit or restrict browser access, trusted.” or use a secure sandboxed browser.  Apply policy controls for app-to- NIST outlines seven risks: content interaction, e.g., an “open-  Lack of physical security in” or “copy-paste” policy. controls  Use of untrusted mobile Interaction with other systems devices  Use of untrusted “Mobile devices may interact with other  Mitigation Strategy (above) for “Use networks systems in terms of data synchronization of Applications” also applies to this  Use of applications and storage… [such as] connecting a Vulnerability category.  Interaction with other mobile device to a desktop or … [or] automatic backups of data to a systems cloud-based storage solution… [T]he  Use of untrusted content organization’s data is at risk of being  Use of location services stored in an unsecured location outside the organization’s control; transmission of malware from device to device is also a possibility.”

Use of untrusted content

“Mobile devices may use untrusted  Educate users on the risks inherent content that other types of devices in untrusted content. generally do not encounter. An example  Restrict use of peripherals, such as is Quick Response (QR) codes … disabling camera use in order to [M]alicious QR codes could direct mobile prevent QR code processing. devices to malicious websites…”  Apply policy controls for app-to- content interaction, e.g., an “open- in” or “copy-paste” policy.

Use of location services

“…[M]obile devices with location  Disable location services. services enabled are at increased risk of  Prohibit use of location services for targeted attacks because it is easier for particular applications such as social potential attackers to determine where networking or photo applications. the user and the mobile device are, and to correlate that information with other sources about who the user associates with and the kinds of activities they perform in particular locations.”

5

Mobile Device Management Capabilities – NIST Guidelines

The NIST Guidelines document also summarizes some of the capabilities that should be provided by an MDM system. Many of these are similar to the capabilities expected in systems management products for and desktops, but there are a few areas where the requirements for managing mobile devices are significantly different, notably those related to controlling the download and use of apps.

Below is a summary of key capabilities. Please consult pages 8-9 of the Guidelines document for more details. Mobile management capability requirements can Category I: General policy differ significantly from those for traditional laptop An MDM system needs to manage security policies centrally. This includes: and desktop management,  Restricting the use of hardware features like camera, GPS, Bluetooth and especially those related to media interfaces controlling the download  Restricting the use of software features such as web browsers, email and use of apps. clients, and app installation services  Managing Wi-Fi and Bluetooth wireless interfaces

Policy management also includes monitoring and reporting on policy violations.

Category II: Data communication and storage NIST outlines four sets of An MDM system should enforce the strong encryption of communications between MDM capability the mobile devices and the organization, as well as the strong encryption of data requirements: stored on both built-in and removable storage on the mobile device.  General policy  Data communication and storage Category III: User and device authentication  User and device authentication An MDM system should control authentication, including:  Requiring passwords and other forms of authentication  Applications  Setting parameters for password strength and incorrect password retries  Allowing administrators to reset access remotely

An MDM system should be able to lock devices, including:  Automatically after a specified idle period  Manually if devices are left in unsecure locations

An MDM system should be able to wipe devices, including:  When device is lost or stolen  After a number of incorrect authentication attempts

Category IV: Applications

An MDM system should be able to control applications on devices through whitelisting and blacklisting, as well as remote installation, update, and removal.

6

An MDM system should be able to distribute applications securely from a dedicated app store.

An MDM system should be able to prevent devices from  Synchronizing with local or cloud-based systems.  Accessing the enterprise network if the device has been rooted or jailbroken  Accessing the enterprise network if the device has the wrong version of the MDM client The Defense Information Systems Agency (DISA) has Detailed Mobile Device Management Requirements – DISA SRG published a detailed

requirements document The NIST Guidelines for Managing the Security of Mobile Devices in the Enterprise document provides very useful high-level descriptions of capabilities that called Mobile Device should be provided by an MDM system. Management (MDM) Server Security Requirements More detailed requirements exist in a document created by the Defense Information Guide (SRG), Version 1, Systems Agency (DISA) for the U.S. Department of Defense. That document is Release 1. called Mobile Device Management (MDM) Server Security Requirements Guide (SRG), Version 1, Release 1 and contains almost 300 potential rules that could be applied to MDM systems used in defense organizations.

It is important to note that this SRG represents a list of possible requirements submitted by agencies, vendors, contributors to standards organizations, and other entities. No single MDM product could implement all of the features suggested in the foreseeable future. However, over time, this list will be consolidated and refined, and even in its current state it provides a valuable trove of ideas for what MDM systems could provide.

Below we have grouped a subset of the MDM SRG requirements into the same four categories of requirements outlined in the NIST Guidelines document discussed earlier. This is not the sequence in which they appear in the SRG, but it makes them easier to absorb and compare. Each section also describes how the MobileIron solution helps address the requirements.

Category I: General policy

Requirements from the MDM SRG

The MDM server must have the administrative functionality to centrally manage configuration settings, including security policies, on managed mobile devices. Rule ID: SRG-APP-000135-MDM-000087-MDM_rule

The MDM server must have the administrative functionality to centrally manage the following security policy rules on managed mobile devices:  Enable or disable Bluetooth SRG-APP-000135-MDM-000099-MDM_rule  Enable or disable Wi-Fi SRG-APP-000135-MDM-000107-MDM_rule

7

 Enable or disable the GPS receiver SRG-APP-000135-MDM-000110- MDM_rule  Enable or disable all cameras SRG-APP-000135-MDM-000112-MDM_rule  Enable or disable the USB port mass storage mode SRG-APP-000135- MDM-000121-MDM_rule  Enable or disable Wi-Fi tethering. SRG-APP-000135-MDM-000122- MDM_rule

The MDM server must notify when it detects unauthorized changes to the security configuration of managed mobile devices. SRG-APP-000286-MDM-000163- Central management of a MDM_rule broad set of mobile configuration settings and The MDM server must detect if the security policy has been modified, disabled, or security policies with full bypassed on managed mobile devices. SRG-APP-000137-MDM-000151-MDM_rule auditability is a core The MDM server must support the capability to deploy operating system and element of the DISA SRG. application updates via over-the-air (OTA) provisioning for managed mobile devices. SRG-APP-000128-MDM-000084-MAM_rule

The MDM server must produce a system-wide (logical or physical) audit trail composed of audit records in a standardized format. SRG-APP-000088-MDM- 000276-SRV_rule

The MDM server must record an event in audit log each time the server makes a security relevant configuration change on a managed mobile device. SRG-APP- MobileIron supports a broad 000130-MDM-000272-SRV_rule set of configuration settings and security policies to give How MobileIron can help address these requirements administrators the flexibility and granularity to design Management of configuration settings and security policies and deploy policies that

match the security The MobileIron MDM platform makes it easy for administrators to enable or disable hardware and software features, including: requirements of a particular  Cameras population of users or  USB connections devices.  Bluetooth  Wi-Fi tethering  Data networks (such as Wi-Fi)  GPS for location detection  Native web browsers  Email clients

The administrator can choose between enabling, disabling, and letting users decide whether to enable many of these features. Many OS-specific features can also be controlled, e.g., blocking Siri and iCloud backup on Apple iOS devices and blocking devices that are out of compliance.

MobileIron features a rule-based compliance engine that lets IT administrators easily define and implement compliance rules for smartphones and tablets to deal with specific events and contextual changes. Managed devices are continuously

8

monitored for violations of defined rules or events. Policies and events that can be monitored include minimum operating system version, encryption enforcement, application whitelists and blacklists, SIM change, roaming state change, and jailbreak / rooting of the device.

If a policy violation occurs, MobileIron can take action by:  Alerting the user and administrator  Blocking access to corporate email, apps, and intranet  Blocking connections using Wi-Fi and VPN MobileIron’s rule-based  Wiping the device’s memory to factory default settings compliance engine

automates notification and Actions can also be automated to enforce closed-loop compliance. data protection responses OTA provisioning and updating to specific events and contextual changes in the MobileIron provides the ability to provision and update mobile devices and software mobile environment. over-the-air (OTA):  Monitor operating system versions to ensure the most recent has been installed and quarantine device if it has not.  Push Wi-Fi, VPN, and email configurations for secure connectivity.  Distribute required apps, e.g., anti-malware software, and their updates through a secure internal app store.  Provide secure access to content like documents and spreadsheets. MobileIron’s provisioning MobileIron also provides flexible provisioning procedures so that mobile devices can process can be driven end- be provisioned: to-end by the administrator  Directly by the administrator or provided through a self-  By an authorized user after the administrator sends an enrollment request service portal to the end through email or SMS  Directly by an authorized user through a self-service portal user.

Audit Trails

MobileIron creates a centralized audit trail of all operational and security events on each mobile device. Administrators can analyze the log data to track configuration changes, as well as events that may indicate an attack or security violation.

Category II: Data communication and storage

Requirements from the MDM SRG

The MDM server must use cryptography to protect the integrity of remote access sessions with managed mobile devices. SRG-APP-000015-MDM-000165-MDM_rule

The cryptographic module supporting encryption of data in transit (including email and attachments) must be FIPS 140-2 validated. SRG-APP-000197-MDM-000159- MDM_rule

9

The MDM server must encrypt all data in transit (e.g., mobile device encryption keys, server PKI certificates, mobile device data bases) using AES encryption. AES 128-bit encryption key length is the minimum requirement with AES 256 desired. SRG-APP-000264-MDM-000224-SRV_rule

The MDM server must employ automated mechanisms to facilitate the monitoring and control of remote access methods. SRG-APP-000016-MDM-000016-SRV_rule

The MDM server must provide the administrative functionality to transmit a remote Data Wipe command to a managed mobile device. SRG-APP-000135-MDM- Appropriate cryptography 000086-MDM_rule and mechanisms to control remote access and data The MDM server must have the administrative functionality to perform a Data Wipe function whereby all data stored in user addressable memory on the mobile device wipe are core elements of and the removable memory card is erased when the maximum number of incorrect the DISA SRG. passwords for device unlock has been reached. SRG-APP-000135-MDM-000088- MDM_rule

How MobileIron can help address these requirements

Encryption

MobileIron allows administrators to require that data stored on devices be encrypted. In addition, all information communicated between mobile devices and MobileIron is transmitted over the TLS 1.2 protocol, using FIPS 140-2 compliant encryption modules. MobileIron protects data-at- rest and data-in-motion, Monitoring remote access methods including selective wipe of work data and applications. MobileIron can also monitor and control remote access methods through:  Providing app-specific secure tunneling  Distributing VPN (Virtual Private Network) profiles  Enforcing the use of VPNs for remote communications  Tracking the use of roaming data networks  Allowing or disallowing the use of Wi-Fi connections  Securing VPN and Wi-Fi connections with certificates

Wiping devices

MobileIron allows administrators to perform both “full” and “selective” data wipes. The former removes all data from the device, and the latter removes just work data and applications, leaving behind the user’s personal data and applications.

MobileIron can protect users from unnecessary wipes by sending messages warning that a wipe will be performed after a grace period if the user does not take action to bring the device back into compliance.

MobileIron sets password policies to ensure that the device is wiped after a pre- defined number of incorrect password attempts by the user.

10

Category III: User and device authentication

Requirements from the MDM SRG

The MDM server must uniquely identify mobile devices managed by the server prior to connecting to the device. SRG-APP-000158-MDM-000153-MDM_rule

The MDM server must disable network access by unauthorized server components or notify designated organizational officials. SRG-APP-000228-MDM-000030- SRV_rule Identity management plus

The MDM server must provide mutual authentication between the MDM server and remediation or protective the provisioned device during a trusted over-the-air (OTA) provisioning session. actions when authentication SRG-APP-000128-MDM-000083-MDM_rule fails are core elements of the DISA SRG. The MDM server must have the capability to enable and disable a managed mobile device. SRG-APP-000134-MDM-000166-MDM_rule

The MDM server must have the administrative functionality to centrally manage the following security policy rules on managed mobile devices:  Enable or disable device unlock password. SRG-APP-000135-MDM- 000091-MDM_rule  Set maximum password age (e.g., 30 days, 90 days, 180 days). SRG-APP- 000135-MDM-000092-MDM_rule  Set the number of incorrect password attempts before a data wipe Access control through procedure is initiated (minimum requirement is 3-10). SRG-APP-000135- MobileIron blocks network MDM-000132-MDM_rule access for unauthorized

devices and provides full How MobileIron can help address these requirements visibility into which devices Access control are attempting to connect to the network. MobileIron can block unauthorized devices from accessing the enterprise network. It also has the ability to quarantine unknown devices; that is, to block the devices from the enterprise network until an administrator can review them and make a decision about whether to provide access.

Network access for managed devices can be either disabled automatically when a compliance rule is broken or disabled manually by the administrator when the device has been lost or stolen. Access to enterprise data on the device can also be similarity restricted in situations of non-compliance or loss.

Authenticating devices to the server

MobileIron uses digital certificates to authenticate mobile devices to the MobileIron server. For example, Apple iOS devices use the Simple Certificate Enrollment Protocol (SCEP) to generate a certificate enrollment request for the MobileIron Certificate Authority (CA), which sends the device an identity certificate. MobileIron also integrates with existing enterprise certificate authorities so agencies can leverage current infrastructure investments. For Android devices, the MobileIron

11

platform sends encrypted configuration information over the air. MobileIron holds the patent for “Management of Certificates for Mobile Devices” (granted July 23, 2013 – U.S. Patent Number 8,494,485).

Managing passwords

MobileIron allows administrators to control password policies on mobile devices. This includes many password rules, such as:  Complexity of password  Minimum password length MobileIron uses digital  Maximum allowable age for password certificates to authenticate  Idle time allowed before the device is locked and needs to be opened again devices and holds the U.S. with a password  Number of failed login attempts that are allowed before data on the device patent for Management of is wiped Certificates for Mobile Devices. Note that device-level password capabilities can vary across mobile operating systems because of the differing capabilities of those underlying systems, so the administrator must be aware of these variances when defining the password policy appropriate to his or her organization.

Category IV: Applications

Requirements from the MDM SRG As applications have

The MDM server must detect and report the version of the operating system, device become more and more drivers, and application software for managed mobile devices. SRG-APP-000270- important for realizing the MDM-000162-MDM_rule full value of mobile government, the ability to The MDM server must support organizational requirements to install software both deliver and secure updates automatically on managed mobile devices. SRG-APP-000269-MDM- mobile applications on 000161-MAM_rule authorized devices has become a core element of The MDM server device integrity validation component must use automated the DISA SRG. mechanisms to alert security personnel when the device has been jailbroken or rooted. SRG-APP-000237-MDM-000175-MDIS_rule

The MDM server must have the administrative functionality to centrally manage the following security policy rules on managed mobile devices:  Enable or disable the mobile device user’s access to an application store or repository. SRG-APP-000135-MDM-000115-MDM_rule  Prohibit the mobile device user from installing unapproved applications. SRG-APP-000135-MDM-000148-MDM_rule  Prohibit the download of software from a DoD non-approved source. SRG- APP-000135-MDM-000149-MDM_rule  Specify a list of approved applications that must be installed on the mobile device and cannot be removed by the user. SRG-APP-000135-MDM- 000150-MDM_rule

12

How MobileIron can help address these requirements

Hardware and software inventory

MobileIron provides a complete hardware and software inventory of devices, including reports for each device about the processor, RAM, storage, battery level, operating system version, firmware, and apps installed.

Device compliance MobileIron provides security Security-related information in the same reports includes which devices have been across the lifecycle of jailbroken or rooted, which devices are in or out of compliance, and the most recent mobile applications and wipe dates for devices. Security personnel are automatically notified and remediation steps are automatically triggered if any device falls out of compliance. holds the U.S. patent for Management of Mobile Application distribution and control Applications.

MobileIron provides a secure app store that allows users to download authorized apps from an app catalog customized for each user based on group, operational unit, or individual authorization. MobileIron holds the patent for “Management of Mobile Applications” (granted January 22, 2013 – U.S. Patent Number 8,359,016)

Authorized applications can include in-house applications specific to the organization or third-party applications available in Apple’s App Store, Google Play™, or Windows Marketplace. MobileIron can also restrict access to these public app stores. Government employees are increasingly utilizing third- MobileIron notifies the user when application updates are available for download. party applications available

in public app stores, and so MobileIron lets administrators set up application control policies:  Whitelists representing what applications are authorized for installation the ability to set appropriate  Blacklists representing what applications are not authorized for installation app control rules in  Required lists representing what applications must be installed at all times MobileIron is broadly utilized. If a user installs or removes an application that breaks these any of these policies, MobileIron’s automated compliance and remediation actions are triggered.

Additional Capabilities of the MobileIron Platform

Access control

When a device or user falls out of compliance, access to enterprise resources is throttled until the issue is remediated. Policy-based access control over the flow of enterprise email, application, document, and web traffic puts the burden of compliance on the shoulders of the user. If the user takes an action that is non- compliant, enterprise access is limited or revoked. As a result, enterprise data is protected no matter what action the user takes.

13

Data loss prevention (DLP) and application containerization

Containerization is the mechanism to ensure that data associated with an application is protected against unauthorized access and distribution. This includes locally cached data from email, web sites, file sharing systems, and mobile apps. IT must have the ability to enforce authentication, encryption, and selective wiping of this data and control the potential vectors of data loss. MobileIron provides containerization with these capabilities across these data types and the corresponding mobile data loss prevention (DLP) controls. Identity Containerization is the mechanism to ensure that The identities of the user and device determine the enterprise services available to data associated with an that user on that device. The majority of MobileIron customers use digital certificates application is protected for identity because they improve the end-user experience while providing IT with against unauthorized both high security and an easy way to revoke access. Back-end integration with access and distribution. directory services like AD/LDAP provides the authentication credentials.

Secure tunneling

Almost every mobile device will connect through untrusted networks at some point when accessing enterprise data. Secure tunneling, with the right level of The identities of user and authentication to prevent man-in-the-middle attacks, must be part of every mobile device determine the deployment. The two options are device-wide VPN or app-specific tunneling. The services available to that former leverages existing infrastructure but costs money and can be turned off by user on that device. the user. The latter secures data-in-motion without any action required from the user and provides more granular controls. MobileIron supports both models.

Geographic security and expense Application-specific Many agencies have employees with sensitive information that travel internationally. tunneling as an alternative MobileIron monitors country and network for each managed device and notifies the to device-wide VPN has administrator when a device enters a new country. attracted the interest of

This allows the administrator to wipe the device if the country is unauthorized so that many agencies, especially sensitive data isn’t at risk of being accessed by foreign governments. for BYOD programs.

This geographic knowledge also allows the administrator to ensure the device is on the appropriate international roaming plan so that there aren’t unexpected charges incurred as a result of the trip. International roaming charges can be a major cost to organizations whose employees travel. MobileIron notifies the administrator when a After email, secure access device leaves the country and can also notify the user of roaming policies and to documents is the first expected behaviors. mobile requirement of many agencies. Secure content

Many agency employees require mobile access to government documents. These documents might exist in repositories such as SharePoint or as email attachments. In either case, mobile access drives productivity but the document has to be made available without putting it at risk of loss or compromise.

14

MobileIron provides three levels of content security  Secure access from the mobile device to back-end content repositories like SharePoint  Encryption of email attachments so that unauthorized mobile apps cannot read them  Secure content hub on the mobile device to store and protect sensitive documents

MobileIron Layered Security Model The MobileIron Layered

Security Model provides MobileIron has a broad security model that addresses the requirements listed in this document. This model provides layered controls for data loss prevention (DLP) that layered controls for data reinforce each other to protect data without damaging the user experience. loss prevention (DLP) that reinforce each other to protect data without damaging the user experience.

15

Summary

Mobile Device Management (MDM) is a complex subject. But the NIST Guidelines document and the DISA SRG, although still evolving, are already valuable resources for coming up to speed on potential requirements for MDM systems.

The requirements can be grouped into four categories: 1. General policy 2. Data communication and storage 3. User and device authentication While Mobile Device 4. Applications Management is a complex subject, the NIST An advanced MDM platform can address many of these requirements. Guidelines and DISA SRG

provide a valuable resource General policy  Set security policies and push them to devices. for evolving requirements.  Enable or disable hardware and software features like camera, connectivity, and cloud storage.  Detect modifications to security parameters on devices and block devices that are out of compliance from accessing the enterprise network.  Provision and update devices over-the-air (OTA).  Collect and compile audit trails from thousands of mobile devices.  Identify jailbroken, rooted, and out-of-compliance devices and prevent them from accessing the enterprise network.  Take automated notification, block, and wipe actions to enforce closed-loop compliance.

Data communication and storage  Enforce the encryption of data at rest and data in motion.  Monitor and secure remote access methods.  Wipe devices that are lost and stolen to remove all enterprise data.  Support both full wipe and selective wipe methods.

User and device authentication  Block unauthorized devices from accessing government networks.  Quarantine unknown and non-compliant devices.  Authenticate devices to the server using digital certificates.  Manage passwords and password policies.

Applications  Collect and compile hardware and software inventory information.  Provide secure internal app store for users to download authorized applications.  Provide integration with public and private app stores.  Manage and enforce application whitelists and blacklists.  Trigger auto-compliance actions if unauthorized applications installed.  Enforce installation of required applications.  Enforce operating system versioning.  Update apps over the air.

16

Additional requirements  Establish policy-based access control.  Containerize all locally cached data.  Tightly integrate with identity services.  Proved app-level secure tunneling.  Monitor usage to control cost.  Enforce geographic security.  Distribute and secure documents and files.  Provide detailed metrics and reporting.

The central NIST and DISA MDM documents can be found at:

NIST Special Publication 800-124 Revision 1, Guidelines for Managing the Security of Mobile Devices in the Enterprise (see Section 2.2) is available at http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-124r1.pdf

DISA Mobile Device Management (MDM) Server Security Requirements Guide (SRG) Version 1, Release 1, 18 January 2013, with an overview memo, is available at http://iase.disa.mil/stigs/net_perimeter/wireless/u_mdm_srg_v1r1_srg.zip. The full SRG is available within this zip file as an XML document.

17