+ All Categories
Home > Documents > 8 Mobile Device Security Steps (172132739)

8 Mobile Device Security Steps (172132739)

Date post: 14-Apr-2018
Category:
Upload: educause
View: 214 times
Download: 0 times
Share this document with a friend
43
7/27/2019 8 Mobile Device Security Steps (172132739) http://slidepdf.com/reader/full/8-mobile-device-security-steps-172132739 1/43 Top 8 Steps for Effective Mobile Security © 2012 Chris Crowley/Joshua Wright 1 Top 8 Steps for Effective Mobile Security Larry Pesce With thanks to Chris Crowley and Joshua Wright
Transcript
Page 1: 8 Mobile Device Security Steps (172132739)

7/27/2019 8 Mobile Device Security Steps (172132739)

http://slidepdf.com/reader/full/8-mobile-device-security-steps-172132739 1/43

Top 8 Steps for Effective Mobile Security © 2012 Chris Crowley/Joshua Wright 1

Top 8 Steps for

Effective Mobile Security

Larry Pesce

With thanks to Chris Crowley and Joshua Wright

Page 2: 8 Mobile Device Security Steps (172132739)

7/27/2019 8 Mobile Device Security Steps (172132739)

http://slidepdf.com/reader/full/8-mobile-device-security-steps-172132739 2/43

Top 8 Steps for Effective Mobile Security © 2012 Chris Crowley/Joshua Wright 2

Outline

• Three Truths About Mobile Security

• Community Development Project• Top 8 Mobile Security Steps• Moving Forward• Conclusion and Q&A

Page 3: 8 Mobile Device Security Steps (172132739)

7/27/2019 8 Mobile Device Security Steps (172132739)

http://slidepdf.com/reader/full/8-mobile-device-security-steps-172132739 3/43

Top 8 Steps for Effective Mobile Security © 2012 Chris Crowley/Joshua Wright 3

Poll - Support

What is the state of mobile supportin your organization?

• No mobile device support• Support for corporate mobile devices• Evaluating BYOD support• Full support BYOD• Don’t know

Page 4: 8 Mobile Device Security Steps (172132739)

7/27/2019 8 Mobile Device Security Steps (172132739)

http://slidepdf.com/reader/full/8-mobile-device-security-steps-172132739 4/43

Page 5: 8 Mobile Device Security Steps (172132739)

7/27/2019 8 Mobile Device Security Steps (172132739)

http://slidepdf.com/reader/full/8-mobile-device-security-steps-172132739 5/43

Top 8 Steps for Effective Mobile Security © 2012 Chris Crowley/Joshua Wright 5

Mobile Security Is Confusing

Yahoo CEO No Longer ConsidersBlackBerry a Smartphone

What is thepoint of

this app?

Page 6: 8 Mobile Device Security Steps (172132739)

7/27/2019 8 Mobile Device Security Steps (172132739)

http://slidepdf.com/reader/full/8-mobile-device-security-steps-172132739 6/43

Top 8 Steps for Effective Mobile Security © 2012 Chris Crowley/Joshua Wright 6

Vendors All Have Something ToSay About Mobile Security

Symantec MobileSecurity Whitepaper

IBM Mobile Enterprise:Manage and Secure

Mobile Securityfrom AT&T

SAP: Mobility, SecurityConcerns, and Avoidance

Page 7: 8 Mobile Device Security Steps (172132739)

7/27/2019 8 Mobile Device Security Steps (172132739)

http://slidepdf.com/reader/full/8-mobile-device-security-steps-172132739 7/43 Top 8 Steps for Effective Mobile Security © 2012 Chris Crowley/Joshua Wright 7

Outline

• Three Truths About Mobile Security

• Community Development Project• Top 8 Mobile Security Steps• Moving Forward• Conclusion and Q&A

Page 8: 8 Mobile Device Security Steps (172132739)

7/27/2019 8 Mobile Device Security Steps (172132739)

http://slidepdf.com/reader/full/8-mobile-device-security-steps-172132739 8/43 Top 8 Steps for Effective Mobile Security © 2012 Chris Crowley/Joshua Wright 8

Develop the SANS Top MobileSecurity Steps Guide

• Develop a guide to help organizationswith the most important steps

• Make it practical and actionable• Identify which steps require a lot of

work, and which can be done quickly – Organized by the overall security benefit

• Concise language for administratorsand management

• Make it free and available to everyone

Page 9: 8 Mobile Device Security Steps (172132739)

7/27/2019 8 Mobile Device Security Steps (172132739)

http://slidepdf.com/reader/full/8-mobile-device-security-steps-172132739 9/43 Top 8 Steps for Effective Mobile Security © 2012 Chris Crowley/Joshua Wright 9

Traditionally, SANS

Does This Well…

Page 10: 8 Mobile Device Security Steps (172132739)

7/27/2019 8 Mobile Device Security Steps (172132739)

http://slidepdf.com/reader/full/8-mobile-device-security-steps-172132739 10/43 Top 8 Steps for Effective Mobile Security © 2012 Chris Crowley/Joshua Wright 10

…For Several Reasons

• Unbiased opinions without the aimto sell a vendor product

• Consensus steps that are theproduct of community involvement – Not one person's ideas, but based on

actual successes and failures• Designed as actionable, practical

steps to actually solve a problem

Page 11: 8 Mobile Device Security Steps (172132739)

7/27/2019 8 Mobile Device Security Steps (172132739)

http://slidepdf.com/reader/full/8-mobile-device-security-steps-172132739 11/43 Top 8 Steps for Effective Mobile Security © 2012 Chris Crowley/Joshua Wright 11

Poll - Guidance

Would you be interested in a mobilesecurity guide?

YES/NO

Page 12: 8 Mobile Device Security Steps (172132739)

7/27/2019 8 Mobile Device Security Steps (172132739)

http://slidepdf.com/reader/full/8-mobile-device-security-steps-172132739 12/43 Top 8 Steps for Effective Mobile Security © 2012 Chris Crowley/Joshua Wright 12

History Part 1

• Josh Wright started drafting the outline andcontent for the "Top N Mobile Security Steps"

• Solicited individual advice and comments from asmall group of mobile experts

– Representing many different organizations• Lots of editing and content development, initialdefinition of 10 critical steps

• Asked for wider review from the SANS AdvisoryBoard list – Forty-Four (44!) reviewers returned substantialfeedback and comments

• Josh managed the editing process, and consensusdiscussion to integrate everything…

Page 13: 8 Mobile Device Security Steps (172132739)

7/27/2019 8 Mobile Device Security Steps (172132739)

http://slidepdf.com/reader/full/8-mobile-device-security-steps-172132739 13/43 Top 8 Steps for Effective Mobile Security © 2012 Chris Crowley/Joshua Wright 13

It Was…Good

• At 25 pages, guide was unwieldy• Advice was solid, but difficult to

articulate specifically• For example: "Develop Policies to

Guide Use" – Great advice, but subject to

interpretation, and difficult to implement

The initial guide was useful, but not great. It wasanother PDF to download, skim, and never read.

Page 14: 8 Mobile Device Security Steps (172132739)

7/27/2019 8 Mobile Device Security Steps (172132739)

http://slidepdf.com/reader/full/8-mobile-device-security-steps-172132739 14/43

Top 8 Steps for Effective Mobile Security © 2012 Chris Crowley/Joshua Wright 14

A Revised Plan of Action!

• Each step must be readily actionablefor most organizations

• Must include detailed, illustratedexamples for each step

• Identify the areas that are beingexploited, and tell people how to fix

them• Consolidate steps into the most

important actions for organizations

Page 15: 8 Mobile Device Security Steps (172132739)

7/27/2019 8 Mobile Device Security Steps (172132739)

http://slidepdf.com/reader/full/8-mobile-device-security-steps-172132739 15/43

Top 8 Steps for Effective Mobile Security © 2012 Chris Crowley/Joshua Wright 15

Outline

• Three Truths About Mobile Security• Community Development Project• Top 8 Mobile Security Steps• Moving Forward

• Conclusion and Q&A

Page 16: 8 Mobile Device Security Steps (172132739)

7/27/2019 8 Mobile Device Security Steps (172132739)

http://slidepdf.com/reader/full/8-mobile-device-security-steps-172132739 16/43

Top 8 Steps for Effective Mobile Security © 2012 Chris Crowley/Joshua Wright 16

Top 8 Mobile Device Security Steps(for people who are serious about mobile security)

1. Enforce Device Passcode Authentication2. Monitoring Mobile Device Access and Use3. Patching Mobile Devices

4. Prohibit Unapproved Third-Party ApplicationStores

5. Disable Developer Debug Access6. Evaluate Application Security Compliance7. Prepare an Incident Response Plan for Lost or

Stolen Mobile Devices8. Implement Management and Operational Support

Page 17: 8 Mobile Device Security Steps (172132739)

7/27/2019 8 Mobile Device Security Steps (172132739)

http://slidepdf.com/reader/full/8-mobile-device-security-steps-172132739 17/43

Top 8 Steps for Effective Mobile Security © 2012 Chris Crowley/Joshua Wright 17

Poll - Passcodes

What is the minimum standard of device passcodes enforced in your

organization?• No passcode enforcement• Numeric PIN• Alphanumeric passcode

• Complex passcode• Biometric passcode• Don’t know

Page 18: 8 Mobile Device Security Steps (172132739)

7/27/2019 8 Mobile Device Security Steps (172132739)

http://slidepdf.com/reader/full/8-mobile-device-security-steps-172132739 18/43

Top 8 Steps for Effective Mobile Security © 2012 Chris Crowley/Joshua Wright 18

#1: Device Passcode Use

• Regardless of enterprise owned orBYOD, all devices must use a passcode

• Selection of passcode influenced bysensitivity of data stored on the device – Convenient email? Minimal passcode.

– PII? Substantial passcode.• Must balance acceptable userequirements with security needs

Page 19: 8 Mobile Device Security Steps (172132739)

7/27/2019 8 Mobile Device Security Steps (172132739)

http://slidepdf.com/reader/full/8-mobile-device-security-steps-172132739 19/43

Top 8 Steps for Effective Mobile Security © 2012 Chris Crowley/Joshua Wright 19

Passcode Requirements

MinimalSecurity

StrongSecurity

Very StrongSecurity

Min. Length 4 characters 6 characters 8 characters

Complexity numeric only2 alpha, 2 numeric

characters2 alpha, 2 numeric,

2 specialcharacters

Maximum Age Indefinite 1 year 180 days

Passcode History 0 passcodes 4 passcodes 8 passcodesAuto-Lock Timer 15 minutes 10 minutes 3 minutes

Maximum FailedAttempts

10 failed passcodeattempts before

wipe

8 failed passcodeattempts before

wipe

4 failed passcodeattempts before

wipe

Page 20: 8 Mobile Device Security Steps (172132739)

7/27/2019 8 Mobile Device Security Steps (172132739)

http://slidepdf.com/reader/full/8-mobile-device-security-steps-172132739 20/43

Top 8 Steps for Effective Mobile Security © 2012 Chris Crowley/Joshua Wright 20

#2: Monitoring Mobile Device Access and Use

• Organizations must monitor andrecord the types and versions of

mobile devices in use• MDM is helpful, but will notcharacterize unmanaged devices

• Leverage multiple data sources,including server logging

Page 21: 8 Mobile Device Security Steps (172132739)

7/27/2019 8 Mobile Device Security Steps (172132739)

http://slidepdf.com/reader/full/8-mobile-device-security-steps-172132739 21/43

Top 8 Steps for Effective Mobile Security © 2012 Chris Crowley/Joshua Wright 21

iphLogparse.ps1

www.willhackforsushi.com/code/iphLogparse.ps1

Page 22: 8 Mobile Device Security Steps (172132739)

7/27/2019 8 Mobile Device Security Steps (172132739)

http://slidepdf.com/reader/full/8-mobile-device-security-steps-172132739 22/43

Top 8 Steps for Effective Mobile Security © 2012 Chris Crowley/Joshua Wright 22

Poll – Upgrades

What is your mobile device upgradeplan/policy?

• Don’t have one • Upgrade before 2 years• Upgrade every 2 years• As time and budget allow• Up to the BYOD users (at will)• Don’t know

Page 23: 8 Mobile Device Security Steps (172132739)

7/27/2019 8 Mobile Device Security Steps (172132739)

http://slidepdf.com/reader/full/8-mobile-device-security-steps-172132739 23/43

Top 8 Steps for Effective Mobile Security © 2012 Chris Crowley/Joshua Wright 23

#3: Patching Mobile Devices

• Using your device monitoring data,patch mobile devices at least quarterly

• This was a contentious issue in

consensus review: – Not so terrible for iOS – Very hard for Android, Windows Phone,

and BlackBerry

Typical lack of support; Android

Fragmentation

Page 24: 8 Mobile Device Security Steps (172132739)

7/27/2019 8 Mobile Device Security Steps (172132739)

http://slidepdf.com/reader/full/8-mobile-device-security-steps-172132739 24/43

Top 8 Steps for Effective Mobile Security © 2012 Chris Crowley/Joshua Wright 24

Update Monitoring

• Identify when new updates are available – Apple security-announce list (bit.ly/LMPOFh) – Android Security Discussion Group

(bit.ly/VwYgOR)• Watch for retired devices

– Apple doesn't officially announce retireddevices; Wikipedia

• Recognize that Android devices have areduced product life with security fixes,and therefore a greater overall cost

Page 25: 8 Mobile Device Security Steps (172132739)

7/27/2019 8 Mobile Device Security Steps (172132739)

http://slidepdf.com/reader/full/8-mobile-device-security-steps-172132739 25/43

Top 8 Steps for Effective Mobile Security © 2012 Chris Crowley/Joshua Wright 25

Poll – Jailbreak/Root

• Do you allow use of jailbroken/rooted mobile devices in

your organization?

• Yes

• No• Unsure• I don’t know what jailbroken/rooted devices

are

Page 26: 8 Mobile Device Security Steps (172132739)

7/27/2019 8 Mobile Device Security Steps (172132739)

http://slidepdf.com/reader/full/8-mobile-device-security-steps-172132739 26/43

Top 8 Steps for Effective Mobile Security © 2012 Chris Crowley/Joshua Wright 26

#4: Prohibit Unapproved Third-Party App Stores

• The primary source of mobile malwareis from third-party app stores – Android: Unofficial stores and "Unknown

sources" configuration setting – iOS: Jailbroken devices

• Prohibit these devices from accessing

company resources – Detect rooted/jailbroken devices withMDM, manual auditing

Page 27: 8 Mobile Device Security Steps (172132739)

7/27/2019 8 Mobile Device Security Steps (172132739)

http://slidepdf.com/reader/full/8-mobile-device-security-steps-172132739 27/43

Top 8 Steps for Effective Mobile Security © 2012 Chris Crowley/Joshua Wright 27

Android Non-Market App Control

Page 28: 8 Mobile Device Security Steps (172132739)

7/27/2019 8 Mobile Device Security Steps (172132739)

http://slidepdf.com/reader/full/8-mobile-device-security-steps-172132739 28/43

Top 8 Steps for Effective Mobile Security © 2012 Chris Crowley/Joshua Wright 28

#5: Disable Developer Debug Access

• Android USB debugging allows a localattacker to bypass security controls – Unlock or bypass device passcode – Install unauthorized applications with any

permissions – Retrieve sensitive data – Execute vulnerabilities to root a device

• Cannot use an MDM to control thissetting (not a feature of Android OS)

• Not on by default for most vendors – Commonly turned on with custom ROMs

Page 29: 8 Mobile Device Security Steps (172132739)

7/27/2019 8 Mobile Device Security Steps (172132739)

http://slidepdf.com/reader/full/8-mobile-device-security-steps-172132739 29/43

Top 8 Steps for Effective Mobile Security © 2012 Chris Crowley/Joshua Wright 29

USB Debug Universal Exploitmobisec $ ./RunMe.sh Please connect device with ADB-Debugging enabled now ...Pushing busybox ...Pushing su binary ...Pushing Superuser appPushing ricIf all is successful i will tell you, if not this shell will run forever.Running ...Successful, going to reboot your device!Waiting for device to show up again ...Copying files to it's place ...You can close all open command-prompts now!After reboot all is done! Have fun!

mobisec $ adb shellshell@android:/ $ sushell@android:/ # grep psk /data/misc/wifi/wpa_supplicant.conf

psk="L0NG@nd0Bscur3p455s0rd"shell@android:/ #

"adb restore" symlink exploitby Bin4ry, overwriting

/boot/local.prop to gain rootaccess. Relies on USB Debug

privileges to exploit Android4.1 and earlier.

Page 30: 8 Mobile Device Security Steps (172132739)

7/27/2019 8 Mobile Device Security Steps (172132739)

http://slidepdf.com/reader/full/8-mobile-device-security-steps-172132739 30/43

Top 8 Steps for Effective Mobile Security © 2012 Chris Crowley/Joshua Wright 30

Poll - Application Evaluation

Do you evaluate mobile deviceapplications in use for your

organization (network, RE,pentesting, etc)?

YES/NO

Page 31: 8 Mobile Device Security Steps (172132739)

7/27/2019 8 Mobile Device Security Steps (172132739)

http://slidepdf.com/reader/full/8-mobile-device-security-steps-172132739 31/43

Top 8 Steps for Effective Mobile Security © 2012 Chris Crowley/Joshua Wright 31

#6: Evaluate App SecurityCompliance

• Many of the risks associated with mobilehinge on application security

• Applications on mobile devices should be

evaluated to identify weaknesses,information disclosure – Alternative: Container-based MAM systems,

which must be evaluated independently

• Manual and automated analysis systemsavailable for app security checking

Page 32: 8 Mobile Device Security Steps (172132739)

7/27/2019 8 Mobile Device Security Steps (172132739)

http://slidepdf.com/reader/full/8-mobile-device-security-steps-172132739 32/43

Top 8 Steps for Effective Mobile Security © 2012 Chris Crowley/Joshua Wright 32

iAuditor

Command-line iOS static and dynamic analysis tool; requires jailbrokendevice. Still limited functionality, but promising for in-depth analysis.

Page 33: 8 Mobile Device Security Steps (172132739)

7/27/2019 8 Mobile Device Security Steps (172132739)

http://slidepdf.com/reader/full/8-mobile-device-security-steps-172132739 33/43

Top 8 Steps for Effective Mobile Security © 2012 Chris Crowley/Joshua Wright 33

Droidbox

Command-line analysis tool for Android. Limited coverage (currently only2.1) depends on TaintDroid for analysis.

Page 34: 8 Mobile Device Security Steps (172132739)

7/27/2019 8 Mobile Device Security Steps (172132739)

http://slidepdf.com/reader/full/8-mobile-device-security-steps-172132739 34/43

Top 8 Steps for Effective Mobile Security © 2012 Chris Crowley/Joshua Wright 34

Mercury Framework

Unprivileged app installed on Android to assess other apps.

Page 35: 8 Mobile Device Security Steps (172132739)

7/27/2019 8 Mobile Device Security Steps (172132739)

http://slidepdf.com/reader/full/8-mobile-device-security-steps-172132739 35/43

Top 8 Steps for Effective Mobile Security © 2012 Chris Crowley/Joshua Wright 35

Poll – Incident Response

What is the status of your mobiledevice Incident Response (IR)

plan?• No overall IT security IR plan• Only an overall plan, but no mobile• A combined IT security/mobile IR plan• A dedicated mobile IR plan

Page 36: 8 Mobile Device Security Steps (172132739)

7/27/2019 8 Mobile Device Security Steps (172132739)

http://slidepdf.com/reader/full/8-mobile-device-security-steps-172132739 36/43

Top 8 Steps for Effective Mobile Security © 2012 Chris Crowley/Joshua Wright 36

#7: Prepare an IncidentResponse Plan

• Users will lose devices, or devices will bestolen

• Organizations must prepare for this incidentto reduce the negative impact – Minimize local device data exposure – Educate users about device loss reporting – React with planned steps to a device loss event – Evaluate requirements for data breach

notification – Review incident handling and improve process• Step-by-Step checklist provided; must be

augmented with org-specific policy steps

Page 37: 8 Mobile Device Security Steps (172132739)

7/27/2019 8 Mobile Device Security Steps (172132739)

http://slidepdf.com/reader/full/8-mobile-device-security-steps-172132739 37/43

Top 8 Steps for Effective Mobile Security © 2012 Chris Crowley/Joshua Wright 37

#8: Engage Management andOperational Support

• Non-technical step, but vitally importantfor thorough mobile security – Appoint a mobile device security evangelist

– Adopt an MDM platform – Identify your supported device baseline – Develop mobile use policies – Leverage network architecture to stop

misuse – Implement regular penetration tests

Top 8 guide details considerations and recommendations for each step

Page 38: 8 Mobile Device Security Steps (172132739)

7/27/2019 8 Mobile Device Security Steps (172132739)

http://slidepdf.com/reader/full/8-mobile-device-security-steps-172132739 38/43

Top 8 Steps for Effective Mobile Security © 2012 Chris Crowley/Joshua Wright 38

Outline

• Three Truths About Mobile Security• Community Development Project• Top 8 Mobile Security Steps• Moving Forward

• Conclusion and Q&A

Page 39: 8 Mobile Device Security Steps (172132739)

7/27/2019 8 Mobile Device Security Steps (172132739)

http://slidepdf.com/reader/full/8-mobile-device-security-steps-172132739 39/43

Top 8 Steps for Effective Mobile Security © 2012 Chris Crowley/Joshua Wright 39

Moving Forward

• Second round of consensusfeedback is currently being

integrated• Final proofing and layout design – Watch for announcements on SANS

NewsBites, and Twitter

Th I Al R F

Page 40: 8 Mobile Device Security Steps (172132739)

7/27/2019 8 Mobile Device Security Steps (172132739)

http://slidepdf.com/reader/full/8-mobile-device-security-steps-172132739 40/43

Top 8 Steps for Effective Mobile Security © 2012 Chris Crowley/Joshua Wright 40

There Is Always Room ForImprovement

• We can use your help! – We are always receptive

to suggestions forimprovement in the guide

• If you have some cycles to submit

feedback, please contact me• If you have stories about problems orsolutions, I want to hear them!

Page 41: 8 Mobile Device Security Steps (172132739)

7/27/2019 8 Mobile Device Security Steps (172132739)

http://slidepdf.com/reader/full/8-mobile-device-security-steps-172132739 41/43

Top 8 Steps for Effective Mobile Security © 2012 Chris Crowley/Joshua Wright 41

Outline

• Three Truths About Mobile Security• Community Development Project• Top 8 Mobile Security Steps• Moving Forward

• Conclusion and Q&A

Page 42: 8 Mobile Device Security Steps (172132739)

7/27/2019 8 Mobile Device Security Steps (172132739)

http://slidepdf.com/reader/full/8-mobile-device-security-steps-172132739 42/43

Top 8 Steps for Effective Mobile Security © 2012 Chris Crowley/Joshua Wright 42

Conclusion

• Implementing the Top 8 Mobile Security Steps willsignificantly improve mobile security – Based on the consensus opinions of respected experts

in the field without motivation to sell you a product• Please contact me if you want to contribute to the

project for a draft copy of the guide• Public availability to be announced shortly• Thank you for attending!

Larry [email protected]

@haxorthematrix

Page 43: 8 Mobile Device Security Steps (172132739)

7/27/2019 8 Mobile Device Security Steps (172132739)

http://slidepdf.com/reader/full/8-mobile-device-security-steps-172132739 43/43

Resources

• Apple security-announce list: bit.ly/LMPOFh• Android Security Discussion Group:

bit.ly/VwYgOR • SANS SCORE Project: sans.org/score• MS Exchange iOS Log Parsing: bit.ly/XuyKdG• SANS NewsBites:

sans.org/newsletters/newsbites• iAuditor: bit.ly/OJA96S• Android "adb restore" exploit: bit.ly/R4jxaQ• This presentation: http://bit.ly/TPk0TX

Questions?


Recommended