BES10 Cloud Solution-Security Technical Overview
Total Page:16
File Type:pdf, Size:1020Kb
Security Technical Overview BES10 Cloud Solution Market Preview Published: 2014-04-22 SWD-20140422090823041 Contents Introduction..................................................................................................................... 7 About this guide................................................................................................................................................................8 What is BES10 Cloud?.......................................................................................................................................................9 Key features of BES10 Cloud....................................................................................................................................10 Key security features of the BES10 Cloud solution.................................................................................................... 11 Hardware and OS security.............................................................................................. 13 Hardware root of trust for BlackBerry devices..................................................................................................................14 The BlackBerry 10 OS.....................................................................................................................................................15 The file system........................................................................................................................................................ 15 Sandboxing............................................................................................................................................................. 15 Device resources..................................................................................................................................................... 16 App permissions......................................................................................................................................................16 Verifying software.................................................................................................................................................... 16 Preventing memory corruption.................................................................................................................................17 Activating and managing devices....................................................................................19 Activating devices...........................................................................................................................................................20 Activating devices over the wireless network............................................................................................................ 20 Activation passwords............................................................................................................................................... 20 Data flow: Activating an iOS device...........................................................................................................................21 Data flow: Activating an Android device....................................................................................................................22 Data flow: Activating a BlackBerry 10 device............................................................................................................24 Using IT policies to manage security................................................................................................................................26 Using compliance profiles to enforce standards for iOS and Android devices....................................................................27 Data in transit.................................................................................................................29 How devices connect to your organization's network....................................................................................................... 30 Protecting Wi-Fi connections................................................................................................................................... 30 Using a VPN............................................................................................................................................................ 30 Types of encryption used for Wi-Fi and VPN connections..........................................................................................30 Protecting email and organizer data.........................................................................................................................32 Protecting data in transit between BES10 Cloud and devices...........................................................................................33 Protecting data in transit between BES10 Cloud and iOS and Android devices.......................................................... 33 Protecting data in transit between BES10 Cloud and BlackBerry 10 devices............................................................. 33 Protecting data in transit between BES10 Cloud and your company directory...................................................................34 Data flow: Establishing a secure connection between BES10 Cloud and the BlackBerry Cloud Connector..................34 Managing certificates..................................................................................................................................................... 36 Sending CA certificates to devices............................................................................................................................36 Sending client certificates to devices........................................................................................................................37 Extending email security................................................................................................................................................. 38 About S/MIME......................................................................................................................................................... 38 S/MIME for BlackBerry 10 devices........................................................................................................................... 38 S/MIME for iOS devices............................................................................................................................................ 43 IBM Notes email encryption for BlackBerry 10 devices.............................................................................................44 Data at rest.....................................................................................................................45 Securing BlackBerry 10 devices for work and personal use..............................................................................................46 How work and personal spaces are separated.......................................................................................................... 46 Securing work and personal apps and data on devices............................................................................................. 47 Controlling how work and personal apps connect to networks...................................................................................56 Protecting data............................................................................................................................................................... 58 Passwords...............................................................................................................................................................58 Security timeout...................................................................................................................................................... 61 Data wipe................................................................................................................................................................ 62 BlackBerry Link protection for BlackBerry 10 devices...............................................................................................65 Backup protection for iOS devices............................................................................................................................66 Encryption...............................................................................................................................................................66 Home screen message on BlackBerry 10 devices.....................................................................................................67 BlackBerry Smart Card Reader................................................................................................................................ 67 Apps.............................................................................................................................. 71 Managing work apps on BlackBerry 10 devices............................................................................................................... 72 Preventing BlackBerry 10 device users from installing apps using development tools.......................................................73 Installing personal apps on BlackBerry 10 devices...........................................................................................................74 Protecting a BlackBerry 10 device from malicious apps...................................................................................................75