2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design

18
Mobile apps and security by design Ollie Whitehouse, Associate Director - NCC Group

Upload: ncc-group

Post on 22-Nov-2014

198 views

Category:

Technology


2 download

DESCRIPTION

 

TRANSCRIPT

Page 1: 2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design

Mobile apps and security by design Ollie Whitehouse, Associate Director - NCC Group

Page 2: 2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design

Agenda

•Challenges

•Benefits • Features

• Privacy

• Product security

•Assurance and COTS

•Response planning

Page 3: 2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design

Problem Statement

“How to develop or purchase COTS

mobile apps for my enterprise while

ensuring security.”

Page 4: 2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design

Real-world challenges

•Cost

•Timelines

•Available security skill-set

•Trust in underlying

technologies

•COTS, the big black box

Page 5: 2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design

Reality

•Last minute security can lead to

•Poor user experience

•Risk of fundamental flaws

• Implementation issues

•Higher expense and wasted

effort

•…. Band-Aid solutions

Page 6: 2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design

How do we know this?

•Secure Development Life-cycles!

•Security earlier is

•Cheaper

•Easier

•More integrated

•Less likely to be wrong

Page 7: 2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design

How do we know this?

• Issues found during final testing

•Back to development

•Re-testing (functional)

• Issues found after release

•All of the above

•Customer support costs

•Regulatory, press / brand etc.

•…

Page 8: 2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design

Put another way..

“Those practicing SDL specifically

reported visibly better ROI results

than the overall population.“ - Forester research

Page 9: 2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design

But it’s not without cost…

~14% extra effort

Page 10: 2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design

What do we care about?

•Functionality

•Security has a bad reputation

•Security is seen as impeding

•Privacy

•Users and customers

•Security

•Risk and regulator

• Integrity and data protection

Page 11: 2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design

Feature benefits

•Meet your risk appetite

•User friendly (UX etc.)

•Measured

• Integrated

•Lower risk of fundamental

issues

Page 12: 2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design

Privacy benefits

•Regulatory compliance

•Publically acceptable

•Consumer versus employee

• Internet versus VPN

•… concepts like do not track etc …

•Consideration around

•What we send, how we send,

what we store and how we store

Page 13: 2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design

Security benefits

•Baked in (intrinsic to the fabric)

•Defence in depth

•Easy (automatic?) to upgrade

•Auditing / logging

•Authentication / authorisation

•Transport security

•Data at rest security

Page 14: 2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design

Mobile security by design

•User experience

•Authentication

•Authorisation

•Storage

•Logging

•Transport

•Upgradability

•Device / user identification

Page 15: 2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design

The COTS challenge

•Marketing buzzword bingo

•3rd party development practices

•Gaining assurance

… in code and processes

… ideally via code access (rare!)

… likely black-box security assessments

… we don’t want to outsource risk

Page 16: 2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design

If it all goes wrong

•Security response processes

• Internally developed

•Escalation points?

•Vendor relationships

•Who would you call?

•Legal agreements?

•Security SLAs?

•Short term mitigations?

Page 17: 2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design

Summary

•Consider security & risk early

•Design security in from the start

•Test security early, test often

•Bigger locks != better security

•Consider user base

•Consider underlying technologies

•Consider tech/user case constraints

•Coax COTS vendors to improve

Page 18: 2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design

UK Offices

Manchester - Head Office

Cheltenham

Edinburgh

Leatherhead

London

Thame

North American Offices

San Francisco

Atlanta

New York

Seattle

Australian Offices

Sydney

European Offices

Amsterdam - Netherlands

Munich - Germany

Zurich - Switzerland

Ollie Whitehouse [email protected]

Thanks! Questions?