Trustspace ; Digital Secure Workspace Based on 'Zero Trust'
Total Page:16
File Type:pdf, Size:1020Kb
TrustSpace ; Digital Secure WorkSpace Based on ‘Zero Trust’ TrustSpace ; Digital Secure I. Enterprise Mobility Trend Under increase their purchase costs and operating WorkSpace Based on Digital Transformation costs, therefore enterprises are certainly ‘Zero Trust’ 1 inclined to use the lower-cost BYOD mode In recent years, with gradual perfection of which is using staff’s existing personal the mobile communications infrastructure Research from Gartner: mobile device for working. The other driving (mobile device, 4G communication Market Guide for force is the staff’s spontaneous need of Mobile Threat Defense 7 network, Android, iOS, and other mobile using their personal device to work. The operating systems) and acceleration COPE/COBO mode will bring about a lot How to Successfully of the digital transformation process of of inconvenience and troubles to the staff Navigate the Hurdles of enterprises, the BYOD mobile working mode during mobile working. A typical case is Global-Scale is gradually becoming the main device that the staff have to carry two phones with BYOD Implementations 16 mode for enterprise mobility. Many industry them, where, one is the company phone for customers, such as those from finance, working, and the other is their own phones. enterprise, government, medical fields, etc., This is a bad experience to the users. The have started to encourage the staff to use staff also like to use their personal devices enterprise applications on their personal for mobile working. device, and allow devices to access the enterprise intranet at any time and any In their 2018 report Gartner reported that, place for mobile working. “…by 2022, more than 75% of smartphones used in the enterprise will be bring your The trend comes from two core driving own device (BYOD), forcing a migration from forces. The first one is the enterprise’s need device-centric management to app- and of continuously reducing the cost and data-centric management.”1 improving the efficiency. With COPE/COBO working mode enterprises will significantly 1 Gartner Inc., Define BYOD Ownership and Support Expectations in Contracts to Ensure Successful Implementation, 29 March 2018, G00351642 Figure 2. Changes in Device Ownership Over a Period of Time2 FIGURE 2 Changes in Device Ownership Over a Period of Time BYOD mobile working not only accelerates the process of enterprise mobility, but also brings new challenges to the enterprises in respect to IT information security, device management, etc. The core challenge is how to securely provide right users right applications and data with right devices at the right time and place. II. Demand Trend and Strategic Recommendations on Enterprise Mobile Security • Demand trend of enterprise mobile security º Enterprises no longer focus on device management; instead, they pay more and more attention on how to deliver mobile applications securely and efficiently and how to protect data. º For BYOD and highly-compliant industry scenarios (such as the government, finance, etc.), the demand of mobile threat defense is increasingly stronger. º Multi-factor identity authentication, dynamic identity authorization, and unified identity management are Base: n = 57 (Desktop) and 43 (Tablet and Smartphone) Gartner Research Circle Members Q: How are each of the following items in the equipment portfolio of the deskbound worker (office becoming the key points to be considered. only) provided today? Q: How do you expect each of the following items in the equipment portfolio of the deskbound º IT senior management pay more attention on mobile worker (office only) to be provided in three years? working user experience and protection of staff’s Source: Gartner (March 2018) personal privacy. • Strategic recommendations on enterprise mobile security º Enterprises upgrade the original device-centered mobile management strategy to the user-centered workspace strategy. º Enterprises build a new mobile security model to cope with the security and compliance challenges under workspace strategy. º Enterprises fully consider the difference between BYOD and COPE mode in respect to security management and user privacy, and make differentiated security strategies. 2 Gartner Inc., Define BYOD Ownership and Support Expectations in Contracts to Ensure Successful Implementation, 29 March 2018, G00351642 2 FIGURE 2 III. ‘Zero-Trust’ Security Architecture of TrustSpace Changes in Device Ownership Over a Period of Time TrustSpace secure workspace (hereinafter referred to as “TrustSpace”) is a brand-new digital secure workspace solution launched by 360 Enterprise Security Group. Based on ‘zero-trust’ and ‘zero-control’ concept, TrustSpace helps enterprises to fully activate BYOD working mode in both IT managers and final users perspectives. It builds a three- level trust system including system environment, identity boundary, and application data, makes the mobile working secure and reliable for IT managers. Moreover, zero management of device, zero collection of privacy, and zero cost of usage, are used to eliminate the mobile users’ privacy concern and stimulate the final users’ mobile working vitality. TrustSpace ‘zero-trust’ security technology is to build a trustworthy workspace on open mobile device, to provide the general data protection scheme for enterprise-level applications and data and completely reduce series of safety risks due to enterprise mobility. TrustSpace ‘Zero-trust’ security is a new secure model built based on device, user, and application, respectively shown as follows: • Trusted Device system environment Source: 360 Enterprise Security Group Based on mobile security big data, TrustSpace MTD (mobile threat defense) technology provides device-level (such as Jailbreak/Root, system vulnerability, and system configuration compliance detection), network-level (such as Wi-Fi security detection), and application-level (such as malicious APP behavior detection) risk perception and threat detection on mobile device, to ensure that TrustSpace run in a secure and trusted operating environment. Source: 360 Enterprise Security Group 3 • Trusted User identity boundary • Trusted Enterprise application and data By deep integration of new-generation container technology and TrustSpace makes the enterprise application/data trusted by protecting identity authentication technology, TrustSpace re-divides the boundary the data in full-life cycle. The mobile device data full-life cycle model of enterprise applications. The boundary has two meanings. The first includes different stages such as data storage, data usage, data meaning is that the boundary is TrustSpace, which builds a basic sharing, and data transmission. At each stage, some core technologies boundary between enterprise applications and personal applications and security mechanisms are used to protect data. At the data storage by container technology and verifies the user identity by implementing stage, the application-layer transparent encryption and decryption basic identity authentication at the entrance of the boundary. The technology is utilized to create an independent secure area in mobile second meaning is the internal application boundary inside TrustSpace device to strong encrypt documents requiring local storage. The container. It is defined based on the different values and sensitivities encryption methods include AES and local cryptographic algorithm. of application and data. For some highly-sensitive applications, Meantime, the key information, such as the key used during data continuous dynamic enhanced identity authentication is required encryption, is subject to secure storage using the secure key box based on the time, position, behavior, and other factors, hence to technology. At the data transmission stage, the TLS-based application- guarantee that these highly-sensitive or highly-valuable applications level encrypted channel is used to realize the secure channel access. can be accessed securely by right users at the right time and place. At the data usage stage, in order to effectively prevent data leakage, it’s necessary to set policies, such as the screenshot protection policy, copy- and-paste prohibition policy, and application/document watermarking policy, etc. At the data sharing stage, the main work is to restrict the data sharing and exchanging between applications in the workspace, or between internal applications and personal applications. The core of data reliability is the data storage reliability, where the key issue is to secure management and storage of the encryption key. TrustSpace secure key box technology is just the right method to realize the secure storage and management of key data such as the encryption key, certificate, etc. It provides the foundation for building a reliability and protection scheme for the enterprise application data through its full life cycle within TrustSpace. Source: 360 Enterprise Security Group Source: 360 Enterprise Security Group 4 5 IV. Functional Modules of internal mobile working application to the V. Application Scenarios of TrustSpace mobile users in a safe and effective manner. TrustSpace TrustSpace provide three different types TrustSpace console is the control and strategy In terms of the functional architecture of product components and function center, which provides a serial of secure and TrustSpace mainly consists of four parts, combinations for different mobile scenarios. compliance policies to users. including TrustSpace client, TrustSpace For a majority of small and medium-sized console, TrustSpace