mobile security - census.gov · • mobile security frameworks • real-time threat monitoring...

12
2 March 2015 Stephen M Dye Mobile Security

Upload: others

Post on 18-Aug-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Mobile Security - Census.gov · • Mobile Security Frameworks • Real-time threat monitoring services • Mobile security products used by Finance and Healthcare • App usage,

2 March 2015

Stephen M Dye

Mobile Security

Page 2: Mobile Security - Census.gov · • Mobile Security Frameworks • Real-time threat monitoring services • Mobile security products used by Finance and Healthcare • App usage,

The Need for Security

•  Both BYOD and GFE devices will be used

•  Both manage sensitive respondent data e.g. Title 13

•  Citizens need to be confident their privacy is secure

•  Auditors, oversight bodies and Congress confidence

•  Protect investment in GFE and BYOD

2 March 2015

Page 3: Mobile Security - Census.gov · • Mobile Security Frameworks • Real-time threat monitoring services • Mobile security products used by Finance and Healthcare • App usage,

Mobile Device Security Challenges

•  Becoming FISMA Compliant

•  No mandated policy for mobility standards in Federal Government

•  Applying current standards

•  Further developing standards for statistical agency use

2 March 2015

Page 4: Mobile Security - Census.gov · • Mobile Security Frameworks • Real-time threat monitoring services • Mobile security products used by Finance and Healthcare • App usage,

Mobile Device Security Challenges

•  Protecting data on phones

•  Secure network access

•  Controlling a phone and apps •  User authentication

•  Malicious apps

2 March 2015

Data spill, exfiltration, device theft

Wi-Fi vulnerabilities, attacks

Open to multiple attack vectors

Secure access, illicit lockout

Threats and risks to device & data

Page 5: Mobile Security - Census.gov · • Mobile Security Frameworks • Real-time threat monitoring services • Mobile security products used by Finance and Healthcare • App usage,

Mobile Device Security Challenges

2 March 2015

•  What Malicious apps can do •  Compromise the phone

•  Run up Bills

•  Read stored data

•  Copy private information

•  Most Malicious apps are Android •  Exhaust battery, slow device down

•  Subscribe user to premium services

•  Modify or send to other locations

•  Third party keyboards

Page 6: Mobile Security - Census.gov · • Mobile Security Frameworks • Real-time threat monitoring services • Mobile security products used by Finance and Healthcare • App usage,

Implementing Security- innovations in the market

•  Mobile Security Frameworks

•  Real-time threat monitoring services

•  Mobile security products used by Finance and Healthcare

•  App usage, reliability & general operational health monitoring

2 March 2015

Page 7: Mobile Security - Census.gov · • Mobile Security Frameworks • Real-time threat monitoring services • Mobile security products used by Finance and Healthcare • App usage,

Innovation- securing Census Apps at creation

2 March 2015

NIST Guides

Industry Practices Guides

Interpret & tailor to Census

Build Software Design & Test

Rules

Test Software

Towards FISMA compliance through managing and working with standards

fix

MCM LiMA Compass

Page 8: Mobile Security - Census.gov · • Mobile Security Frameworks • Real-time threat monitoring services • Mobile security products used by Finance and Healthcare • App usage,

Real-time mobile threat monitoring

2 March 2015

•  Manage BYOD Risk & Vulnerability

•  Automate Enterprise App Approval

•  Vet every app on all devices

•  Research Threats in Real-Time

•  Discover anomalous mobile threats

•  See apps accessing private data

Page 9: Mobile Security - Census.gov · • Mobile Security Frameworks • Real-time threat monitoring services • Mobile security products used by Finance and Healthcare • App usage,

Mobile Device and Mobile Application Management

2 March 2015 2 March 2015

•  MDMs manage devices: –  Control entire phone –  Set policies across entire phone –  Black and white list apps, app stores –  Entire phone can be wiped

•  MAMs literally manage apps: –  Corporate / enterprise apps –  Secures data created by apps –  Remote wipe: enterprise data only –  Leave personal items alone –  If authentication is required –  whether data is stored on device –  Control GPS, Cutting & Pasting etc.

Finance

Healthcare

Page 10: Mobile Security - Census.gov · • Mobile Security Frameworks • Real-time threat monitoring services • Mobile security products used by Finance and Healthcare • App usage,

App usage, reliability & monitoring

2 March 2015

•  Dashboards & Reports Notifications

•  Availability, Performance Monitoring

•  User action scrutiny

•  Transaction execution monitoring

•  Crash and Error reporting

Page 11: Mobile Security - Census.gov · • Mobile Security Frameworks • Real-time threat monitoring services • Mobile security products used by Finance and Healthcare • App usage,

In summary

2 March 2015

•  Security is paramount for mobile operations

•  Security is also mission assurance; not just data

•  Many challenges in implementing mobile security

•  Innovation in the market place addresses concerns

Page 12: Mobile Security - Census.gov · • Mobile Security Frameworks • Real-time threat monitoring services • Mobile security products used by Finance and Healthcare • App usage,

Stephen M Dye email: [email protected]

703-585-9399