Enterprise Security and
Android Platform




                            Presented by
             Technology Consulting Group
         Endeavour Software Technologies
                                       1
Session Contents

• Overview of Mobility and Mobile Security
   – Introduction to Mobility
   – Mobile Security


• Best Practices for Secure Software Development

• Android OS
   – Security Architecture and deployment
   – Android Attack Surfaces
   – Enterprise features, What can we leverage?


• Questions?

                                                   2
What is Mobility


                                                Enterprise Mobility
• A Capability
• Communicate and         The ability of an enterprise to connect to
  Access                  people and control assets from any location.

• On the Move             Technologies that support enterprise mobility
                          include wireless networks, mobile applications,
• Anytime                 middleware, devices, and security and
• From Anywhere           management software.

• Voice, Messages, Data   Forrester Research Definition




                                                                            3
What is happening in the Corporate World?




                                            4
Mobile Security – Everywhere!




      Application     Device
        Level          Level




            Network Level




                                5
Security Considerations for Enterprise Mobility


                     • Mobility Infrastructure
                        –   Security is a key focus area.
    Infrastructure      –   Ensuring existing policies is implemented
                        –   Integration with existing tools, systems
                        –   Keep devices light, manageable
                     • Mobile Middleware Platform
Middleware              –   Composite Applications Landscape and devices
                        –   Mobile Device Management
                        –   Mobile Data Synchronization
                        –   Phased approach for Common Services and
    Distribution            Mobile Applications
                     • Mobile Applications Distribution
                        – Enterprise distribution through OTA to specific
                          devices

                                                                            6
Application Security – Must Include



           User          Data Security
       Authentication     on Device




                            Device
                         Management
       Data in Transit       and
                          Application
                         Provisioning




                                         7
Enterprise Mobile Security – Do’s




                                    8
Enterprise Mobile Security – Best Practices


1. Protect the Brand Your Customers Trust

2. Know Your Business and Support it with Secure
   Solutions

3. Understand the Technology of the Software

4. Ensure Compliance to Governance, Regulations, and
   Privacy

5. Design, Develop and Deploy Software with Secure
   Features
                                                       9
Android Security Architecture



           Permission
          Based Model




                  Remote App
    Sandbox
                  Management




                                10
Android Security – Permission based model
  • Permission-based Model
      – Linux + Android’s Permission

      – Well defined at system level

      – Approved by user at install

      – High-level permissions restricted by Android runtime
         framework

      – For example, an application that needs to monitor incoming
         SMS messages would specify
<manifest xmlns:android="http://schemas.android.com/apk/res/android"
  package="com.android.app.myapp" >
 <uses-permission android:name="android.permission.RECEIVE_SMS" />
  ...</manifest>                                                       11
Android Security – Remote App Management

• Remote Install/removal
  – Google can remove or install apps remotely

  – Users can install apps remotely from online Android
    Market

  http://market.android.com




                                                          12
Android Security - Sandbox




                             13
Android’s Attack Surfaces

• Isolated applications is like having multi-user system

• Single UI/ Device  Secure sharing of UI and IO

• Appeals to user for all security decisions

• Phishing style attach risks

• Its not Java sandbox, its Linux sandbox. Native code not a
   barrier

• Any java App can execute shell, load JNI libraries, write and
   exec programs

Reference – iSEC PARTNERS                                         14
Enterprise features (Froyo/ GingerBread)

• Remote wipe
   – Remotely reset the device to factory defaults

• Improved security
   – Addition of numeric pin, alphanumeric passwords to
     unlock the device

• Exchange calendars

• Auto-discovery

• Global Address List look-up
                                                          15
Enterprise features (Honeycomb)

• New device administration policies
   – Encrypted storage

   – Password expiration

   – Password history

   – Complex characters in password

• Configure HTTP proxy for each connected WiFi access
  point (AOS 3.1 only)

• Encrypted storage cards
                                                        16
Questions ?




              17
Thank You
+91 80 4288 5500 (IND)
+44 20 7193 0986 (UK)
+1 214 306 6848 (US)

info@techendeavour.com
www.techendeavour.com




                         18

More Related Content

PPTX
Sophos Mobile Control - Product Overview
PPTX
Sophos Wireless Protection Overview
PDF
SmartDevCon - Katowice - 2013
PDF
Enterprise Mobile Security
PDF
Symantec Enterprise Mobility Vision May 2012
PDF
Ibm Mobile Device Security Datasheet V2.0
PPTX
Mobile Application Security
PPTX
Mobile application securitry risks ISACA Silicon Valley 2012
Sophos Mobile Control - Product Overview
Sophos Wireless Protection Overview
SmartDevCon - Katowice - 2013
Enterprise Mobile Security
Symantec Enterprise Mobility Vision May 2012
Ibm Mobile Device Security Datasheet V2.0
Mobile Application Security
Mobile application securitry risks ISACA Silicon Valley 2012

What's hot (20)

PDF
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
PPTX
Stratégies de croissance via la mobilité (ems)
PDF
Your Shortcut to BYOD Success
PDF
Mobile Security for Banking and Finance
PDF
Mobile Security for Smartphones and Tablets
PDF
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
PDF
IBM MaaS360 with watson
PPTX
IBM MaaS360 with Watson
PPTX
Mobile – Adoption and Adaption in 2012
PDF
Mobile App Virtualization 101
PDF
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMI
PDF
Session 4 Enterprise Mobile Security
PDF
Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...
PPTX
Mobile Device Managment
PPTX
Mobile device security
PDF
Laptop management
PPTX
Sophos EndUser Protection
PPTX
Samsung KNOX - The Most Secure Android Solution
PPTX
Get the Most From Your Firewall
PPTX
Sophos utm-roadshow-south africa-2012
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
Stratégies de croissance via la mobilité (ems)
Your Shortcut to BYOD Success
Mobile Security for Banking and Finance
Mobile Security for Smartphones and Tablets
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
IBM MaaS360 with watson
IBM MaaS360 with Watson
Mobile – Adoption and Adaption in 2012
Mobile App Virtualization 101
Cut BYOD Costs Using Virtual Mobile Infrastructure - VMI
Session 4 Enterprise Mobile Security
Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...
Mobile Device Managment
Mobile device security
Laptop management
Sophos EndUser Protection
Samsung KNOX - The Most Secure Android Solution
Get the Most From Your Firewall
Sophos utm-roadshow-south africa-2012
Ad

Viewers also liked (15)

PDF
Securing Android
PDF
Android Camp 2011 @ Silicon India
PPTX
Android secure offline storage - CC Mobile
PPT
Analysis and research of system security based on android
PPTX
Clean architecture on Android
PPTX
Permission in Android Security: Threats and solution
PDF
Clean architecture: Android
PPTX
Android sandbox
PDF
Deep Dive Into Android Security
PDF
Testing Android Security Codemotion Amsterdam edition
PDF
Android Security
PDF
Scheduling in Android
PPTX
Understanding android security model
PDF
Embedded Android Workshop with Nougat
PPT
Securing Android
Android Camp 2011 @ Silicon India
Android secure offline storage - CC Mobile
Analysis and research of system security based on android
Clean architecture on Android
Permission in Android Security: Threats and solution
Clean architecture: Android
Android sandbox
Deep Dive Into Android Security
Testing Android Security Codemotion Amsterdam edition
Android Security
Scheduling in Android
Understanding android security model
Embedded Android Workshop with Nougat
Ad

Similar to Webinar on Enterprise Security & android (20)

PPT
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
PPTX
Symantec Enterprise Mobility Enhancements
PDF
C0c0n 2011 mobile security presentation v1.2
PPTX
Symantec Advances Enterprise Mobility Strategy
PPTX
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
PDF
Ascure session
PPTX
Mobile Security for the Enterprise
PPTX
Embracing secure, scalable BYOD with Sencha and Centrify
PDF
Developing Secure Mobile Applications
PPT
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
PPT
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
PDF
Wso2 con byod-shan-ppt
PDF
Reference Security Architecture for Mobility- Insurance
PDF
Microsoft System Center 2012 Delivering better IT Management
PDF
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
PDF
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
PDF
Samsung knox security_solution_v1_10_0
PDF
Mobile Application Security
PPTX
Security testing of mobile applications
PPTX
Untitled 1
Udløs potentialet i Enterprise Mobility, Vijay Dheap, IBM US
Symantec Enterprise Mobility Enhancements
C0c0n 2011 mobile security presentation v1.2
Symantec Advances Enterprise Mobility Strategy
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
Ascure session
Mobile Security for the Enterprise
Embracing secure, scalable BYOD with Sencha and Centrify
Developing Secure Mobile Applications
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 -  Embracing BYOD Trend Without Compromising Security, Emp...
Wso2 con byod-shan-ppt
Reference Security Architecture for Mobility- Insurance
Microsoft System Center 2012 Delivering better IT Management
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
Samsung knox security_solution_v1_10_0
Mobile Application Security
Security testing of mobile applications
Untitled 1

More from Endeavour Software Technologies (20)

PPTX
State-of-the-art Personalized Shopper Engagement Platform For a Technology Co...
PPTX
Visual transaction signing solution
PPTX
Check cashing mobile solution
PDF
Endeavour Leadership Advices
PDF
IoT Infusion into Businesses: Sooner than Expected
PDF
Cloud Driving Strategic Growth For Businesses
PDF
Developed a State-of-the-art Personalized Shopper Engagement Platform For a T...
PDF
Developed a Modular Disease Management Self-help Platform For a Health Soluti...
PDF
How Analytics is Driving the Next Big Leap in Financial Services
PDF
Designed and Implemented a Sign Tracking System For a Large Realtor From The ...
PDF
Developed a Mobile Headhunting Solution For a Leading Executive Search Firm
PDF
Developed an Enterprise Database and Workflow Solution For a Leading Private ...
PDF
Developed a Multi-lingual Inventory Management Platform For a Leading Health ...
PDF
mHealth:Transitioning Healthcare to a Technology Oriented Model
PPTX
How Glass will Shape the Future of Enterprises
PDF
Android Wear Virtual Digital Assistant on your wrist
PDF
Redefining the Digital Retail Space with NFC,Beacons and Apple pay
PPTX
PPTX
iOS7 : Looking beyond parallax
PPTX
Accelerate mobile application development by leveraging reusable component fr...
State-of-the-art Personalized Shopper Engagement Platform For a Technology Co...
Visual transaction signing solution
Check cashing mobile solution
Endeavour Leadership Advices
IoT Infusion into Businesses: Sooner than Expected
Cloud Driving Strategic Growth For Businesses
Developed a State-of-the-art Personalized Shopper Engagement Platform For a T...
Developed a Modular Disease Management Self-help Platform For a Health Soluti...
How Analytics is Driving the Next Big Leap in Financial Services
Designed and Implemented a Sign Tracking System For a Large Realtor From The ...
Developed a Mobile Headhunting Solution For a Leading Executive Search Firm
Developed an Enterprise Database and Workflow Solution For a Leading Private ...
Developed a Multi-lingual Inventory Management Platform For a Leading Health ...
mHealth:Transitioning Healthcare to a Technology Oriented Model
How Glass will Shape the Future of Enterprises
Android Wear Virtual Digital Assistant on your wrist
Redefining the Digital Retail Space with NFC,Beacons and Apple pay
iOS7 : Looking beyond parallax
Accelerate mobile application development by leveraging reusable component fr...

Webinar on Enterprise Security & android

  • 1. Enterprise Security and Android Platform Presented by Technology Consulting Group Endeavour Software Technologies 1
  • 2. Session Contents • Overview of Mobility and Mobile Security – Introduction to Mobility – Mobile Security • Best Practices for Secure Software Development • Android OS – Security Architecture and deployment – Android Attack Surfaces – Enterprise features, What can we leverage? • Questions? 2
  • 3. What is Mobility Enterprise Mobility • A Capability • Communicate and The ability of an enterprise to connect to Access people and control assets from any location. • On the Move Technologies that support enterprise mobility include wireless networks, mobile applications, • Anytime middleware, devices, and security and • From Anywhere management software. • Voice, Messages, Data Forrester Research Definition 3
  • 4. What is happening in the Corporate World? 4
  • 5. Mobile Security – Everywhere! Application Device Level Level Network Level 5
  • 6. Security Considerations for Enterprise Mobility • Mobility Infrastructure – Security is a key focus area. Infrastructure – Ensuring existing policies is implemented – Integration with existing tools, systems – Keep devices light, manageable • Mobile Middleware Platform Middleware – Composite Applications Landscape and devices – Mobile Device Management – Mobile Data Synchronization – Phased approach for Common Services and Distribution Mobile Applications • Mobile Applications Distribution – Enterprise distribution through OTA to specific devices 6
  • 7. Application Security – Must Include User Data Security Authentication on Device Device Management Data in Transit and Application Provisioning 7
  • 9. Enterprise Mobile Security – Best Practices 1. Protect the Brand Your Customers Trust 2. Know Your Business and Support it with Secure Solutions 3. Understand the Technology of the Software 4. Ensure Compliance to Governance, Regulations, and Privacy 5. Design, Develop and Deploy Software with Secure Features 9
  • 10. Android Security Architecture Permission Based Model Remote App Sandbox Management 10
  • 11. Android Security – Permission based model • Permission-based Model – Linux + Android’s Permission – Well defined at system level – Approved by user at install – High-level permissions restricted by Android runtime framework – For example, an application that needs to monitor incoming SMS messages would specify <manifest xmlns:android="http://schemas.android.com/apk/res/android" package="com.android.app.myapp" > <uses-permission android:name="android.permission.RECEIVE_SMS" /> ...</manifest> 11
  • 12. Android Security – Remote App Management • Remote Install/removal – Google can remove or install apps remotely – Users can install apps remotely from online Android Market http://market.android.com 12
  • 13. Android Security - Sandbox 13
  • 14. Android’s Attack Surfaces • Isolated applications is like having multi-user system • Single UI/ Device  Secure sharing of UI and IO • Appeals to user for all security decisions • Phishing style attach risks • Its not Java sandbox, its Linux sandbox. Native code not a barrier • Any java App can execute shell, load JNI libraries, write and exec programs Reference – iSEC PARTNERS 14
  • 15. Enterprise features (Froyo/ GingerBread) • Remote wipe – Remotely reset the device to factory defaults • Improved security – Addition of numeric pin, alphanumeric passwords to unlock the device • Exchange calendars • Auto-discovery • Global Address List look-up 15
  • 16. Enterprise features (Honeycomb) • New device administration policies – Encrypted storage – Password expiration – Password history – Complex characters in password • Configure HTTP proxy for each connected WiFi access point (AOS 3.1 only) • Encrypted storage cards 16
  • 18. Thank You +91 80 4288 5500 (IND) +44 20 7193 0986 (UK) +1 214 306 6848 (US) info@techendeavour.com www.techendeavour.com 18

Editor's Notes

  • #4: Definition of mobilityDefinition of enterprise mobility
  • #5: There is a realization that mobility goes beyond email. Isolated success in deployment of mobile solutions have reinforces this belief.The main application areas:Using mobility to extend the reach and availability of corporate data. Allowing for better informed decision makingEnabling corporate communicationsEmailInstant MessagingSocial Media Tools3. Using the mobile device as an application and service delivery platformContent: access and presentation of corporate content on a device, providing the right information at the right time and placeTransactions and Workflows: Enabling a mobile worker to work away from officeAnalytics and Reporting: Dashboards with intelligent reporting and analytic capabilities provide powerful business aides on the move.4. A derivative of mobile deployment: COST -&gt; From device procurement, software overheads, recurring telecom expenditure. Telecom expense management: Cost control and management5. Customer outreach: using the reach of mobile devices to reach, communicate with, track behavior, provide service, generate brand recall, and loyalty, using the power social media on mobile devices
  • #6: Device Level Security –Applies to device management security. Controls who can access to specific device settings. Controls the level of access to device settings.Even if sufficient security is implemented in wireless virtual private networks (VPNs), if a device is lost or stolen, the entire corporate intranet could be threatened if those devices aren&apos;t protected by password and other user-level security measuresNetwork level securityTwo basic security problems in wirelessConnecting to the network does not need physical access to the network-Just stand outside a building, you can get connected to AP that is inside the building2. The broadcast nature of radio communications-WiFi network normally operate at 150mW, upto 300M radius-Have you ever tried wireshark (or tcpdump)‏3. Other related security vulnerabilities -Anyone can generate transmissions, -which will be received by other devices in range-which will interfere with other nearby transmissions and may prevent their correct reception (jamming)‏-Injecting bogus messages into the network is easy-Replaying previously recorded messages is easy4. Illegitimate access to the network and its services is easy-Denial of service is easily achieved by jammingNetwork level security challenges1. Transmission Securityat physical, medium access and data link layers over wireless media.2. Communication Securitymessage confidentiality, integrity, and end-point authentication3.Authorization and Access Control4. Network Infrastructure Protection5. Robustness6. Efficiency
  • #7: Mobility InfrastructureSecurity is a key focus area. Ensuring existing policies is implemented for MobilityIntegrationExtend existing integration tools and rulesIntegration with the existing backend systemCan we “Build everything as an infrastructure component and keep devices light”? Definite need for Mobile Middleware PlatformComposite Applications Landscape, Composite Devices to be supportedMobile Device Management is an urgent Priority! Start managing your devices from Day 1!Common Services and Mobile Applications Layer can arrive in stagesMobile Applications DistributionEnterprise distribution through OTA to specific devices based on device ID or user IDhttp://www.cellcrypt.com/deployment
  • #8: 1. User Authentication: Due to the size limits of mobile devices, mobile applications tend to neglect password policies of enterprise. Thedesktop application may be following 8-10 character password policy but mobile application may be allowing 4 characters PIN. One shouldcarefully evaluate the effect of such diversions from norms and come up with a pragmatic approach keeping mobile device size andsecurity in perspective.2. Data Security on Device: Mobile applications tend to store data on local device for performance reasons. This can pose seriousrisks. One can think about encrypting the data for local storage but then encryption-decryption is a resource intensive function especiallyif you rely on asymmetric algorithms. One should take a balanced approach, for example one can use symmetric algorithms forencrypting data and use asymmetric key for encrypting symmetric key.3. Data in Transit : Data in transit (when data moves from one system to another system) is another critical aspect of datasecurity. In the case of mobile applications, there are so many intermediaries in-between. Ensuring the data confidentiality and dataintegrity in transit can pose serious challenges.4. Device Management and Application Provisioning: As one can imagine, people move to different departments within the samecompany. With the move, it is critical that their access to enterprise applications via mobile applications is provisioned and de-provisionedin a controlled manner. Managing the right level of mapping between mobile devices and mobile applications poses unauthorized accessrisk.5. Security Analysis and Monitoring: Monitoring security incidents such as password changes, failed logons, unauthorized accessrequests, non-repudiations is critical as they can help you identify risks in your mobile application environment. A carefully structuredapproach towards mobile applications security monitoring can help you to thwart these risks.
  • #10: 4. Healthcare apps should follow FDA guidelines.
  • #11: These are 3 security pillars of Android Security Architecture.
  • #12: A particular permission may be enforced at a number of places during your program&apos;s operation: At the time of a call into the system, to prevent an application from executing certain functions. When starting an activity, to prevent applications from launching activities of other applications. Both sending and receiving broadcasts, to control who can receive your broadcast or who can send a broadcast to you. When accessing and operating on a content provider. Binding to or starting a service.
  • #13: Recently Google has removed some of the malware applications remotely from users devices without any user intervention.Vodafone now has its own content channel in the Android Market app store to help its customers find its services and apps.Vodafone&apos;s move is also an acknowledgement of how important the Android Market can be as a distribution channel for an operator&apos;s own apps and services.
  • #14: Application Isolation – Note editor cannot read emailDistinct UIDs and GIDs for each install
  • #16: Remote wipe: Exchange administrators can remotely reset the device to factory defaults to secure data in case device is lost or stolen.Improved security with the addition of numeric pin or alpha-numeric password options to unlock device. Exchange administrators can enforce password policy across devicesExchange Calendars are now supported in the Calendar application.Auto-discovery: you just need to know your user-name and password to easily set up and sync an Exchange account (available for Exchange 2007 and higher).Global Address Lists look-up is now available in the Email application, enabling users to auto-complete recipient names from the directory.
  • #17: In Android 3.0, developers of device administration applications can support new types of policies, including policies for encrypted storage, password expiration, password history, and password complex characters required.Android 3.1Users can now configure an HTTP proxy for each connected Wi-Fi access point. This lets administrators work with users to set a proxy hostname, port, and any bypass sub-domains. This proxy configuration is automatically used by the Browser when the Wi-Fi access point is connected, and may optionally be used by other apps. The proxy and IP configuration is now backed up and restored across system updates and resets.To meet the needs of tablet users, the platform now allows a &quot;encrypted storage card&quot; device policy to be accepted on devices with emulated storage cards and encrypted primary storage.