Defending Mobile Devices for High Level Officials and Decision-Makers
Total Page:16
File Type:pdf, Size:1020Kb
Authors Teemu Väisänen, Alexandria Farar, Nikolaos Pissanidis, Christian Braccini, Bernhards Blumbergs, and Enrique Diez Defending mobile devices for high level officials and decision-makers Tallinn 2015 This publication is a product of the NATO Cooperative Cyber Defence Centre of Excellence (the Centre). It does not necessarily reflect the policy or the opinion of the Centre or NATO. The Centre may not be held responsible for any loss or harm arising from the use of information contained in this publication and is not responsible for the content of the external sources, including external websites referenced in this publication. Digital or hard copies of this publication may be produced for internal use within NATO and for personal or educational use when for non‐ profit and non‐commercial purpose, provided that copies bear a full citation. www.ccdcoe.org [email protected] 1. Abstract High‐level officials and decision‐makers handle and store sensitive data with their own or with their organisations’ mobile devices. The sensitive data may be owned by the person him/herself or by the organisation. These users do not always follow security policies, creating a risk of leaking this sensitive data. It is often impossible to assess all the places where data is accessed and/or stored. The purpose of this study is to find mitigation mechanisms for a number of risks resulting from the usage of such systems without obeying security policies. The study was done by analysing usage scenarios; their actors and the assets to be secured; related mobile threats; suitable mitigation mechanisms; and threats lacking good enough mitigation mechanisms. The key results of this study are a set of threat descriptions and existing mitigation mechanisms, along with proposed new mechanisms for mitigation. Results can be implemented by adding the described security controls and mitigation mechanisms to systems to improve their security. Keywords: security awareness, security policies, mobile devices, COPE, BYOD, MDM, EMM, risk analysis 1 3. Table of Contents 1. Abstract .......................................................................................................................................................... 1 2. List of Abbreviations ....................................................................................................................................... 2 3. Table of Contents ........................................................................................................................................... 4 4. Table of Figures .............................................................................................................................................. 7 5. Table of Tables ............................................................................................................................................... 8 6. Executive Summary and Recommendations .................................................................................................. 9 7. Introduction.................................................................................................................................................. 10 8. Research process (methods) ........................................................................................................................ 13 9. Usage scenarios, actors and assets to be protected .................................................................................... 14 10. Threats ......................................................................................................................................................... 15 10.1. T1: Disclosure of information .............................................................................................................. 17 10.2. T2: Unauthorised device usage ........................................................................................................... 17 10.3. T3: Unauthorised physical access into a device’s memory and storage .............................................. 19 10.4. T4: Get physical access to the device .................................................................................................. 20 10.5. T5: An unauthorised remote access to a device .................................................................................. 21 10.6. T6: Social engineering attacks ............................................................................................................. 23 10.7. T7: Network spoofing attacks .............................................................................................................. 24 10.8. T8: Lack of security patches, updates and secure distribution ............................................................ 25 10.9. T9: Jailbreaking and rooting of devices ............................................................................................... 26 10.10. T10: Personal, political and organisational reputation ........................................................................ 26 10.11. T11: Denial‐of‐Service (DoS) attacks ................................................................................................... 26 11. Risk analysis .................................................................................................................................................. 28 12. Literature Review ......................................................................................................................................... 30 12.1. Existing guidelines, checklists and lists of security controls ................................................................ 30 12.1.1. National Institute of Standards and Technology (NIST) ................................................ 30 12.1.2. SANS Institute ................................................................................................................ 30 12.1.3. European Network and Information Security Agency (ENISA) ...................................... 31 12.1.4. Finnish Communications Regulatory Authority ............................................................ 31 12.1.5. Communications‐Electronics Security Group (CESG) .................................................... 32 12.1.6. Centre for the Protection of National Infrastructure (CPNI) ......................................... 32 12.1.7. Open Web Application Security Project (OWASP) ........................................................ 33 4 12.1.8. Other guidelines and recommendations ....................................................................... 33 12.1.9. Summary of review of existing recommendations ....................................................... 34 12.2. Existing countermeasures and security controls ................................................................................. 35 12.2.1. Secure storage and data encryption ............................................................................. 35 12.2.2. Securing communication ............................................................................................... 36 12.2.3. Mobile Device Management (MDM), Enterprise Mobility Management (EMM) and Mobile Application Management (MAM) solutions...................................................................... 39 12.2.4. Securing mobile data and data loss prevention (DLP) solutions ................................... 42 12.2.5. Secure smartphones and their security controls .......................................................... 44 12.2.6. Multiple user accounts .................................................................................................. 57 12.2.7. Multi‐factor authentication products ........................................................................... 57 12.2.8. Tracking of devices ........................................................................................................ 60 12.2.9. Intrusion Detection and Prevention Systems (IDS/IPS) ................................................. 60 12.2.10. Security Information & Event Management (SIEM) .................................................. 67 12.2.11. Vulnerability Assessment Scanner (VAS) ................................................................... 70 12.2.12. Mobile Internet Security Suites ................................................................................. 73 12.2.13. Mobile firewalls ......................................................................................................... 73 12.2.14. Proxifiers .................................................................................................................... 74 12.2.15. Virtualisation ............................................................................................................. 74 12.2.16. Summary of the review of existing products ............................................................ 75 12.3. Countermeasures presented by researchers ...................................................................................... 75 12.3.1. Malware and rootkit detection ..................................................................................... 76 12.3.2. Enforcing security policies ............................................................................................. 76 12.3.3. Multi‐factor authentication ........................................................................................... 77 12.3.4. Context‐based and implicit authentication ..................................................................