no passwords! secure mobile architecture for enterprise...

20
CRISC CGEIT CISM CISA 2013 Fall Conference – “Sail to Success” No Passwords! Secure Mobile Architecture for Enterprise Mobility and BYOD Ben Ayed, CEO, Secure Access Technologies Dr. Scott Jenkins, CEO, m-Health Technologies In-Depth Seminars – D13

Upload: others

Post on 28-Jun-2020

15 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: No Passwords! Secure Mobile Architecture for Enterprise ...sfisaca.org/images/FC13Presentations/D13_Presentation.pdf · Secure Mobile Architecture for Enterprise Mobility and BYOD

CRISC

CGEIT

CISM

CISA 2013 Fall Conference – “Sail to Success”

No Passwords! Secure Mobile Architecture for Enterprise

Mobility and BYOD

Ben Ayed, CEO, Secure Access Technologies

Dr. Scott Jenkins, CEO, m-Health Technologies

In-Depth Seminars – D13

Page 2: No Passwords! Secure Mobile Architecture for Enterprise ...sfisaca.org/images/FC13Presentations/D13_Presentation.pdf · Secure Mobile Architecture for Enterprise Mobility and BYOD

9/22/2013 2

CRISC

CGEIT

CISM

CISA 2013 Fall Conference – “Sail to Success”

THE MOBILITY TSUNAMI

2

Page 3: No Passwords! Secure Mobile Architecture for Enterprise ...sfisaca.org/images/FC13Presentations/D13_Presentation.pdf · Secure Mobile Architecture for Enterprise Mobility and BYOD

2013 Fall Conference – “Sail to Success” September 30 – October 2, 2013

The Mobility Tsunami

• Why iPads are a threat to enterprise?

• Does legacy security work with mobile devices?

3

Page 4: No Passwords! Secure Mobile Architecture for Enterprise ...sfisaca.org/images/FC13Presentations/D13_Presentation.pdf · Secure Mobile Architecture for Enterprise Mobility and BYOD

2013 Fall Conference – “Sail to Success” September 30 – October 2, 2013

Security Vulnerability Assessment

• Data Leakage

• Password Attack

• Device Attack

4

Page 5: No Passwords! Secure Mobile Architecture for Enterprise ...sfisaca.org/images/FC13Presentations/D13_Presentation.pdf · Secure Mobile Architecture for Enterprise Mobility and BYOD

2013 Fall Conference – “Sail to Success” September 30 – October 2, 2013

The Security Conundrum

Strong Passwords

Short Session Timeout

Frequent Password Change

Single Sign On

Bad User Experience

Session Attacks

Password attacks

Calls to help desk

Passwords & SSO are risky for enterprise. CISOs need to focus more on user authentication instead only focusing on intrusion detection and monitoring

Page 6: No Passwords! Secure Mobile Architecture for Enterprise ...sfisaca.org/images/FC13Presentations/D13_Presentation.pdf · Secure Mobile Architecture for Enterprise Mobility and BYOD

2013 Fall Conference – “Sail to Success” September 30 – October 2, 2013

Security Solutions

6

• Do fingerprints solve mobile security problems?

Page 7: No Passwords! Secure Mobile Architecture for Enterprise ...sfisaca.org/images/FC13Presentations/D13_Presentation.pdf · Secure Mobile Architecture for Enterprise Mobility and BYOD

2013 Fall Conference – “Sail to Success” September 30 – October 2, 2013

Security Solutions

• Do MDM / MAM solve mobile security problems?

• Does Virtualization solve the problem?

7

Page 8: No Passwords! Secure Mobile Architecture for Enterprise ...sfisaca.org/images/FC13Presentations/D13_Presentation.pdf · Secure Mobile Architecture for Enterprise Mobility and BYOD

2013 Fall Conference – “Sail to Success” September 30 – October 2, 2013

Mobile Security Solutions

Other Solution:

• Location based authentication

• Presence monitoring:

– Bluetooth proximity or motion detection

• No passwords

• Application self-defense

8

Page 9: No Passwords! Secure Mobile Architecture for Enterprise ...sfisaca.org/images/FC13Presentations/D13_Presentation.pdf · Secure Mobile Architecture for Enterprise Mobility and BYOD

9/22/2013 9

CRISC

CGEIT

CISM

CISA 2013 Fall Conference – “Sail to Success”

SECURE MOBILE ARCHITECTURE

9

Page 10: No Passwords! Secure Mobile Architecture for Enterprise ...sfisaca.org/images/FC13Presentations/D13_Presentation.pdf · Secure Mobile Architecture for Enterprise Mobility and BYOD

2013 Fall Conference – “Sail to Success” September 30 – October 2, 2013

Mobile Architecture Security Challenges

10

• Compliance gaps

• Single Point of Failure

• Requires connectivity

• Kerberos & BrowserID type solutions amplify those vulnerabilities on mobile devices… An attacker that gains access to one application on the authorized device can access all applications

Kerberos

BrowserID

Page 11: No Passwords! Secure Mobile Architecture for Enterprise ...sfisaca.org/images/FC13Presentations/D13_Presentation.pdf · Secure Mobile Architecture for Enterprise Mobility and BYOD

2013 Fall Conference – “Sail to Success” September 30 – October 2, 2013

Not So Secure Mobile Architecture

11

Can Compromise Network Security

Page 12: No Passwords! Secure Mobile Architecture for Enterprise ...sfisaca.org/images/FC13Presentations/D13_Presentation.pdf · Secure Mobile Architecture for Enterprise Mobility and BYOD

2013 Fall Conference – “Sail to Success” September 30 – October 2, 2013

More Secure Mobile Architecture

12

No servers in DMZ

Page 13: No Passwords! Secure Mobile Architecture for Enterprise ...sfisaca.org/images/FC13Presentations/D13_Presentation.pdf · Secure Mobile Architecture for Enterprise Mobility and BYOD

2013 Fall Conference – “Sail to Success” September 30 – October 2, 2013

No Change to Infrastructure

Secure Mobile Architecture

13

Active Directory

PKI / SecurID

Policy Console

Token

App Server 1

App Server 2

App Server n

Security Layer

Policy DB

No servers in DMZ

No tradeoff between security and usability

Page 14: No Passwords! Secure Mobile Architecture for Enterprise ...sfisaca.org/images/FC13Presentations/D13_Presentation.pdf · Secure Mobile Architecture for Enterprise Mobility and BYOD

2013 Fall Conference – “Sail to Success” September 30 – October 2, 2013

Secure Mobile SSO

14

Password Typed

User logged in

Comparison with SSO / Kerberos / SAML: -Works out-of-network -No single point-of-failure -Works with any application -Easy installation

App Servers

SSO with No Single Point of Failure

Policy DB

Check proximity

Verify PIN

PIN Verified

Get Keys

Decryption Keys

-Biometrics authentication enables authentication without token - Can be installed/removed on small number of devices without impacting others

Page 15: No Passwords! Secure Mobile Architecture for Enterprise ...sfisaca.org/images/FC13Presentations/D13_Presentation.pdf · Secure Mobile Architecture for Enterprise Mobility and BYOD

2013 Fall Conference – “Sail to Success” September 30 – October 2, 2013

Secure Mobility Requirements

15

Requirement Benefits

FFIEC Multi-factor Requirements Compliant

Real-time presence monitoring & Application self-defense

Security / Compliance

Adaptive Authentication based on location, transaction risk and policy

Security / User experience

Off-line access Flexibility

Works on any device Scalability

Policy driven Manageability

Easy integration Affordability

No password Minimize helpdesk calls

Page 16: No Passwords! Secure Mobile Architecture for Enterprise ...sfisaca.org/images/FC13Presentations/D13_Presentation.pdf · Secure Mobile Architecture for Enterprise Mobility and BYOD

2013 Fall Conference – “Sail to Success” September 30 – October 2, 2013

Market Solutions

16

Solution Type Description Advantage Disadvantage (Limitations/Concerns)

MDM:

Enforce device level passwords, Wifi access Provide remote wipe when lost device is still connected to the network e.g.: Airwatch, MobileIron, Fiberlink

Cloud infrastructure

Require connectivity Password attack Session attack

MAM: Encrypt email, calendar and browser Force traffic through their servers e.g.: Good Email, Fixmo Safezone

Data resident security Data in transit security

Require connectivity Password attack Session attack

VDI: Convert data to screens on a server and transfer them to the mobile device for viewing e.g.: Citrix, Armor5

Secure Browser

Require connectivity Password attack Session attack

Application Wrapping:

Inject object code in iOS and Android applications e.g. Mocana, Apperian

Mobile only Data resident security Data in transit security

Require connectivity Password attack Session attack

Page 17: No Passwords! Secure Mobile Architecture for Enterprise ...sfisaca.org/images/FC13Presentations/D13_Presentation.pdf · Secure Mobile Architecture for Enterprise Mobility and BYOD

2013 Fall Conference – “Sail to Success” September 30 – October 2, 2013

Closing Mobile Security Gaps

17

Type of Limitation/Concern Mitigation Example Solutions

Require connectivity

Off-line multi-factor authentication: -Application scans the user through Bluetooth to detect that the user phone is in proximity - Application asks the user some questions and request voice response

Secure Access Technologies (SAT) provides off-line multi-factor user authentication

Password attack

Authenticate the user with adaptive multi-factor authentication depending on location, application and policies Request a token or biometrics

Secure Access Technologies (SAT) provides real-time proximity monitoring

Session attack

monitor the user proximity to the application or motion in real-time. If the user moves away, lock

Secure Access Technologies (SAT) integrated with Good Email, Fixmo Safezone and Citrix Worx

Page 18: No Passwords! Secure Mobile Architecture for Enterprise ...sfisaca.org/images/FC13Presentations/D13_Presentation.pdf · Secure Mobile Architecture for Enterprise Mobility and BYOD

2013 Fall Conference – “Sail to Success” September 30 – October 2, 2013

SAT Architecture

18

Smart Phone Token or

Bluetooth Token: PKI Key

1- Check: token proximity, location, device integrity, PIN, CAC or biometrics … 2- Login: No-password login to any app

3- Real-time monitoring 4- Breach: Application self-defense

Policy Console sets access

and sets wipe policies for all applications

Secured Application

Security Layer

Wrapper Engine Upgrades Legacy Applications in Minutes

Wrapper Engine: Takes legacy apps, injects security layer object code

Soft or hard token: • 3-factors of authentication

including biometrics • 4-factors of authorization

The policy dashboard defines: • Rules for Adaptive authentication • Rules for application self-defense

Page 19: No Passwords! Secure Mobile Architecture for Enterprise ...sfisaca.org/images/FC13Presentations/D13_Presentation.pdf · Secure Mobile Architecture for Enterprise Mobility and BYOD

9/22/2013 19

CRISC

CGEIT

CISM

CISA 2013 Fall Conference – “Sail to Success”

LIVE DEMO: USE CASE: NO PASSWORDS

ONE-CLICK LOGIN TO ANY ACCOUNT

19

Page 20: No Passwords! Secure Mobile Architecture for Enterprise ...sfisaca.org/images/FC13Presentations/D13_Presentation.pdf · Secure Mobile Architecture for Enterprise Mobility and BYOD

2013 Fall Conference – “Sail to Success” September 30 – October 2, 2013

Thank You

20

iPhone

iPad

Ben Ayed & Scott Jenkins Secure Access Technologies Inc.

1370 Willow Rd. #2, Menlo Park, CA 94025

Tel: 650 209 6670

Email: [email protected]

Web: www.SecureAccessTechnologies.com

10+ patents issued: Proximity token / proximity security, Security layer, application self-defense, wrapper engine, SSO, mobile biometrics…