Tuesday, April 2, 2013

MDMs Lack Some, How Do You Say? Oh Yes, Security...


Cybersecurity is lax for some 14,000 commercial mobile devices used at the U.S. Military Academy and the United States Army Corps of Engineers Engineer Research and Development Center, according to a report released March 26 by the U.S. Department of Defense Inspector General's office.
Not only had the Army's Chief Information Officer not implemented an effective cybersecurity program to manage the devices, the IG reported, but he was unaware that the 14,000 devices were being used throughout the Army by soldiers and civilians.
Cybersecurity sins found by the IG at West Point and Corps of Engineers center included:
  • Absence of a mobile device management application to protect data on the devices;
  • Absence of a facility for wiping all data from a phone should it be lost or stolen;
  • Ability to use the devices as removable media for the storage of sensitive data; and
  • Absence of training and user agreements.

"These actions occurred because the Army CIO did not develop clear and comprehensive
policy for CMDs [commercial mobile devices] purchased under pilot and non-pilot programs," the IG's report said.
"In addition, the Army CIO inappropriately concluded that CMDs were not connecting to Army networks and storing sensitive information," the report said. "As a result, critical information assurance controls were not appropriately applied, which left the Army networks more vulnerable to cybersecurity attacks and leakage of sensitive data."
In a response to the report, the Army's CIO said that policies are in place to address the concerns raised. He said that a request for proposal would be aired by the military branch this month and systems installed within the next 12 months to give it visibility of all devices and meet the governance and oversight recommendations.

Gaps In Security

Normally, one would believe that today’s MDM solutions have the appropriate security measures in place; however, you would be sadly mistaken, for many of these solutions were born from billing consolidation and lack the appropriate infrastructure to perform a comprehensive security solution.  Many rely on an honor system that suggests that they use a particular browser that will ensure their security mechanisms are in place.  Others have solutions better security measures; however, as soon as their VPN is turned off, so is that ingenious solution.





MDM Today

The capabilities of an MDM product fundamentally depend on the management interfaces made available to it by the underlying mobile operating system. In fact, even when an MDM vendor provides a similarly-named product for multiple mobile OS platforms, considerable differences exist between the enterprise management capabilities possible on each platform. Furthermore, neither MDM products nor any commercially-supported 3rd party software enable an enterprise to carry out arbitrary modifications to the underlying mobile OS platform. This represents a fundamental departure from the traditional managed desktop paradigm, in which 3rd party software can run highly-privileged code with power equal to that of the operating system. Yet, mobile OS platforms include very powerful security-enhancing features such as application isolation and mandatory code signing that have yet to be widely implemented on desktop or server platforms. In fact, for the general-purpose use case, it is not at all clear that the lack of some enterprise controls makes these mobile devices less secure than other platforms.  

MDM products typically involve an agent on the mobile devices, a server component used by administrative personnel within an enterprise enclave, and an intermediary server operated by the platform vendor. The on-device agent may be a hidden part of the mobile OS itself, or it may take the form of a 3rd party app distributed through online app repositories. The intermediary server maintains a continuous connection to the devices to facilitate on-demand queries such as push notifications initiated by the enterprise. Some MDM products depend on additional network infrastructure, which may compel additional risk considerations.  

Gaps for Specialized, High-Security Use Cases

Most commercially-supported MDM products and the platforms on which they run are designed for general-purpose use and for compatibility with the BYOD scenario. This means that many feature trade-off s have been made that are detrimental to specialized scenarios having higher security requirements. Implementation of the following features would significantly advance the suitability of commercially-available mobile devices for more specialized, high-security use cases across government and industry.

Binding Only to Trusted Wireless Networks.

The ubiquitous wireless connectivity of mobile devices is the source of much of their perceived
risk to enterprise IT. This risk could be significantly mitigated by enforcing a policy that requires all network traffic from enterprise-managed devices to pass through an enterprise-controlled path, such as a secure WiFi network or VPN, which is monitored and filtered by established network defenses such as firewalls and intrusion detection systems. The need for a robust network binding capability backed by mutual cryptographic authentication is not yet suitably met by any MDM and mobile OS combination. Interestingly, some configurations support the analogous ability to connect only to particular cellular Access Point Names.

Automatic, Comprehensive VPN Connectivity.

Many VPN implementations, such as those provided by “SSL VPNs,” ensure only that a subset of a device’s network communications are cryptographically protected and routed to a trusted enclave. Only when all of a device’s network layer communications transit a trusted enclave is the enterprise positioned to defend in depth against network attacks aimed at the mobile devices. Furthermore,  enterprise enforcement of this configuration ensures that  users are not burdened with manual setup, and enterprises  have confidence in their ability to provide network-based  defenses to mobile devices.

Verifiable Device Integrity.

Some MDM solutions  attempt to detect modification of the underlying  platform, but since the MDM agent has limited privileges  and is susceptible to compromise by malicious privileged  software, these stand little chance of detecting a targeted  attack by a capable adversary. An immutable cryptographic  root of trust on the platform, available to be leveraged by  MDM or other software, provides a means of countering  this threat. This provides the ability for devices to credibly  attest their integrity to an enterprise and also soundly carry  out any local policy decisions. The availability of this root  of trust to other software can powerfully complement  a chain of trust which begins at boot and extends into  system runtime, already available on some platforms. An  additional benefit to an immutable root of trust is that it  allows an enterprise to bind the unique identity of that  device with other credentials to restrict enterprise access to  only those devices. In effect, the device itself can become  one of the factors of a multi-factor access.

Cryptographic Trust Management.

Enterprise-managed  devices that connect exclusively to an enterprise intranet  have no need to trust many of the root Certificate  Authorities that are trusted by default on the platform.  To reduce the risk of compromise through fraudulent  certificates, enterprises using devices in high-security  scenarios should have the ability to remove root Certificate  Authorities from managed devices’ trust stores. Given the  recent, high-profile compromises of certificate authorities  and certificates, a compelling case exists for this capability  in the general purpose use case as well. 

AMIRITE?

Yes, this all holds water with only one exception, there is a solution that came out before its time two years ago and is now finding its niche.  ContinuityFocus.com has an MDM solution that addresses all of the above and even has a loadable kernel for those who really want to control a device when its off reservation.  In all fairness though, we shall not devulge the product, for this is not a marketing vehicle.  However it is a wake up call.



Source(s)

So “Once more unto the breach, dear friends, once more;”
____________________________________________________________

About Rick Ricker

An IT professional with over 21 years experience in Information Security, wireless broadband, network and Infrastructure design, development, and support.

For more information, contact Rick at (800) 399-6085

No comments:

Post a Comment

Thanks for your input, your ideas, critiques, suggestions are always welcome...

- Wasabi Roll Staff