byod risk management best practices

17
© 2013 Tangoe, Inc. BYOD Risk Management Best Practices Presented by: Troy Fulton, Director, Product Marketing May 22 & 23, 2013

Upload: troy-fulton

Post on 25-Jun-2015

279 views

Category:

Technology


4 download

DESCRIPTION

You already know BYOD is here to stay. How can you give employees the flexibility they demand? Prevent BYOD from becoming BYOT (threat)? Ensure a uniform trust model for device provisioning? Mitigate the risks for applications, network access and data security? This webinar provides a policy framework for BYOD enablement: • Risk and vulnerability assessment • Security and access policies • Key success factors • Trigger response policies • Prevent data loss at both the application and device level • Shared device security policies • Options for achieving your security requirements and end-user expectations

TRANSCRIPT

Page 1: BYOD risk management best practices

© 2013 Tangoe, Inc.

BYOD Risk Management Best Practices

Presented by:

Troy Fulton, Director, Product Marketing

May 22 & 23, 2013

Page 2: BYOD risk management best practices

© 2013 Tangoe, Inc.

Today’s Speaker

2

Troy Fulton

Director, Product Marketing

• 20+ years in high-tech and communications devices

• Senior product marketing and management positions with global

corporations including Motorola Mobility, Nokia, and Compaq

• MBA from The College of William and Mary; BA from Boston

College

Page 3: BYOD risk management best practices

© 2013 Tangoe, Inc.

Agenda

• BYOD Trends

• Concerns and Risks

• Segmentation

• Mistakes to avoid

• Security and Access Management

• Best Practices

• Critical Success Factors

• Shared Control

Page 4: BYOD risk management best practices

© 2013 Tangoe, Inc.

A Radical Shift is Occurring

4

Page 5: BYOD risk management best practices

© 2013 Tangoe, Inc.

Gartner: The BYO Trend is Clear

5

• Over 60% of employees report

using a personal device for work

• US and APAC lead, EU lags

• 2/3 of consumers report that work

influences what they buy for

personal devices

• By 2015, emphasis will shift

toward cost-reduction through

mandatory BYO programs

• PC BYOD lags smartphones and

tablets (<8% of companies) but

will accelerate in 2014+

Page 6: BYOD risk management best practices

© 2013 Tangoe, Inc.

Concerns and Risks

• Not surprising drivers and concerns

• 55%: employee satisfaction = productivity (Source: Information Security Group survey 4/2013)

• 54%: need for increased employee mobility

• 51%: increased employee productivity

• Favorite devices: iOS (72%), followed by Android, Blackberry, Microsoft

• Concerns

• 70% stated security as top criteria for success

• Loss of company or client data, unauthorized access and malware infections

• Lack the resources necessary to address security concerns

• 33% stated they do not have even a basic BYOD policy in place

• 78% of security professionals believe BYOD is a significant risk (Source: Frost and Sullivan)

• Unknown level of exposure

• Where is our data?

• Who has access to what resources?

• Who else has, or could have, access to our data and resources?

• Is BYOD strategic?

6

Page 7: BYOD risk management best practices

© 2013 Tangoe, Inc.

Segment Employees and Security Profiles

7

Under the Radar

Minimal BYOD

Formal BYOD

Corporate Liable

• Employee owned

device without

corporate support or

awareness

• No trust, no access

• Employee owned

device with usage

policy enforcement for

selected applications

and data

• Event trigger-based

policy enforcement

• Minimal access / trust

• No support

• IT approved device

• Senior execs and

knowledge workers to

replace corporate-

supplied devices

and/or protect

strategic IP and data

• Event trigger-based

policy enforcement

• Full network access

• Strong authentication

• Minimal support

• IT approved device

• MDM client required

• Corporate supplied

device and formal

processes to enforce

compliance respective

to role and location.

• Fully trusted

• Event trigger-based

policy enforcement

• Full network access

• Strong authentication

• Full support

• IT approved device

• MDM client required

Page 8: BYOD risk management best practices

© 2013 Tangoe, Inc.

From “Under the Radar” to “Over the Dam”

• No management results in BYOD happening without you

• Easy connect into company systems and store business data

• No identification, tracking or management.

• Microsoft EAS does not help

• Does not identify and remediate a jailbroken or rotted device

• No enforcement of device, OS or app version controls.

• “Free and easy“ was not tolerated for company or personal laptops

• In the real world…

• Easy for devices to connect to company systems – no alerts

• No lifecycle management

• Apps, data, and network access credentials are not removed

• Unmanaged (unknown) devices remain fully active until passwords expire.

• Best practices:

• No access to email, LAN, VPN, Wi-Fi or other services without authentication

• Users are limited to 2 devices

8

Page 9: BYOD risk management best practices

© 2013 Tangoe, Inc.

Getting Started: Policy Strategy Questions

• Who qualifies?

• What devices are allowed?

• Who buys/owns the device?

• \What service expenses will be covered, and how?

• What is supported, at what level?

• What does the employee have to do?

• Enterprise security, data usage and privacy restrictions

• Employee privacy issues

• Labor implications of after-hours support

• Liability issues (E-discovery)

• Limitations on reimbursement (what is the strategy?)

• Penalties for noncompliance (and enforcement?

• Data and phone number transition at termination

• Support policies and liability issues must be reviewed by the corporate legal department, the

executive board, HR and business unit managers.

9

Page 10: BYOD risk management best practices

© 2013 Tangoe, Inc.

Minimal Acceptable Usage Policy Guidelines

• All devices

• Device will lock your account after 10 failed login attempts.

• Device will lock every 30 minutes requiring reentry of your password.

• Password rotation every 90 days with minimal strength

• Remote wipe:

• Lose the device; terminate employment; IT detects data or policy breach or virus

• Minimum device level: iPhone 4, iOS 5.0x, Android 3.x

• Company-administered MDM

• No jailbreak & no rooting policies

• Certificates for any and all access: email, apps, networks

• Application and data encryption at all times

• Personal devices

• Limit device enrollments at company discretion

• Filter sensitive data at company discretion

• Accept company lock/wipe decisions

• Require end-user acceptable-use policy agreement

10

Page 11: BYOD risk management best practices

© 2013 Tangoe, Inc.

Mistakes to Avoid: Inconsistent Security Policies

• Focus on business requirements first and devices second

• Policy gaps are the origins of most mobile security failures

• Determine approved platform options for BYOD

• Get cross-departmental buy-in

• Business information requirements may be overly broad and difficult to fulfill

across mobile platforms

• Security policies need to account for OS limitations

• Adapt data and application policies accordingly, and document your policies

• All mobile devices are work platforms, irrespective of liability model

• Anticipate that mobile work platform loss could result in data breach event

• May require disclosure

• Know and track your device, application, and data inventory

11

Page 12: BYOD risk management best practices

© 2013 Tangoe, Inc.

Mistakes to Avoid: Data Leakage

• DLP has low visibility

• Security managers report these events tend to be ignored by decision makers

• Pervasive data fragmentation

• Send, save and mingle

• Difficult to trace or audit

• Consider data container solutions

• Options range from email encryption to content management

• Prioritize based on employee role, data sensitivity and access method

• Unsafe device sharing

• Tablets for business will end up playing “Barney” reruns or sports research at a BBQ

• Built-in (and reliable) biometric security…not on the immediate horizon

• Lost devices…be proactive

• Mitigate risks

• Strong authentication for connectivity

• Credentials that expire after a period of time

• Dual persona containerization

12

Page 13: BYOD risk management best practices

© 2013 Tangoe, Inc.

Mistakes to Avoid: Click First, Worry Later

• Applications want your data

• iOS and Android apps are designed to be sandboxed

• End-users are not aware of risks from apps obtaining data from other apps

• Includes: contacts, location (current and history), Facebook friends, purchases

• Data is tracked and sold

• Example: unapproved email application obtains login credentials

• Malware

• iOS has low risk

• Android has experienced more malware incidents

• Best practices

• App AUPs for employee devices

• Control limits of app installation on iOS and Android vs. Windows and Blackberry

• Mitigate on the device via containerization or virtualization

• Protect network resources via web application firewall

• Android has unique risks

• Unapproved OS versions available

• Applications from unofficial sources 13

Page 14: BYOD risk management best practices

© 2013 Tangoe, Inc.

BYOD Security and Access Best Practices

• Mobility is not a traditional IT silo

• Cross-functional governance

• Core team: business, apps, I&O, policy

• Create semi-annual strategy

• Report to CIO

• IT governance council includes mobile

• Automated trigger-based responses

• Out of compliance real time monitoring

• Notifications and alerts

• Feature and function changes

• Out of compliance

• Device OS is out of date

• No password = no encryption

• Applications requiring a patch

• Jailbroken and rooted detection

• Baseline resource access to resources

• Liability model and AUPs

• Audit installed apps for non-compliance

• Perform background app inventory analysis

• Risk management

• Process for compliance enforcement

• Work across organizational structure

• Define use cases and app strategy

• Pitfalls to avoid

• Approaching mobility as tactical and not

strategic

• Choosing technology first

Page 15: BYOD risk management best practices

© 2013 Tangoe, Inc.

• Create an access baseline

• Determine who has access

• Identify access control gaps

• Tie access controls to environment

• Segregate access by role and liability

model

• Best practice what works best for your

company

• Check applicable regulations

• Policy of “least access”

• Regulators want doctrine of “least

privilege” applied

• Enable specific security roles to enforce

security and access management

policies

• Automate device provisioning

• Pre-configure AUP liability models

• Integrate with TEM procurement

• Terminate unused accounts

• Prevent access to resources

• Consider a device recycle program

• Proactively monitor for unusual activity

• Monitor high volume of SMS or data

• Control remote access to apps and

databases

• Mobility and cloud computing expand the

enterprise operational perimeter

• NAC is becoming a baseline requirement

BYOD Security and Access Critical Success Factors

Page 16: BYOD risk management best practices

© 2013 Tangoe, Inc.

Tactics to Share (Not Gain) Control

• Consumerisation is not a uni-direction highway

• Successful BYOD is a true win-win

• Shared accountability

• Make (sustainable) choices

• No strategy, no hope for control

• Segmentation is key

• Trust, liability, users, approved devices and applications, data management

• Cross-discipline buy-in

• One approach (aka PC) will not fly

• Security enforcement consistency across segments

• Know what employees need now vs. next year

• Guide business leaders

• Revisit application architectures & tools

• Thinner = lower cost and more device neutral

• BYOD benefits

• Innovation, employee satisfaction, and cost optimization

16

Page 17: BYOD risk management best practices

© 2013 Tangoe, Inc.

Questions and Contacts

Troy Fulton

Director Product Marketing

[email protected]

Tangoe

203.859.9300

[email protected]

www.tangoe.com