Vulnerabilities / Threats
11/18/2011
12:40 PM
Grant Moerschel
Grant Moerschel
Commentary
Connect Directly
Twitter
RSS
E-Mail
50%
50%

App Freedom Vs. Corporate Security

IT has to walk a fine line when securing user-owned mobile devices.

You can't prevent employees from snapping up iPads and Droid phones, even if you wanted to. Sixty-five percent of respondents to our InformationWeek 2011 Mobile Device Management and Security Survey predict that the number of employee-owned devices accessing company data will increase. What you can do is use your leverage when they want to connect to business systems by asking them to run mobile device management (MDM) software, which can enforce corporate policies and provide features such as device tracking and remote wiping.

Even though it's a fair trade, IT must still tread carefully, because the enterprise is permitting access by a device it doesn't own. A key challenge is to craft policies that provide adequate security assurance while at the same time respecting the owner's personal application and usage choices. After all, users who shell out hundreds of dollars for slick new tablets are going to install whatever applications they want.

The tension between ownership and protection often boils over when IT tries to push policies that whitelist or blacklist apps in response to attackers unleashing malicious software that targets mobile platforms.

Dangerous Markets

This problem is particularly acute for Android, which has an enormous user base and a flexible app market. Tim Wyatt, principal security engineer at Lookout Mobile Security, says Android's open application distribution model allows apps to be pulled from multiple markets--including repackaged versions of legitimate apps. Malware is also on the Android Market itself. For example, according to Lookout's research, when DroidDreamLight emerged as a threat, it was found to be repackaged in 20 utility, nine porn, and five game apps in the Android Market. To make matters worse, the Android model relies on a user's ability to evaluate the permissions an app is requesting at install time.

Apple imposes stricter control over its own app market, but it's not a foolproof system. For instance, security researcher Charlie Miller developed a proof-of-concept malware app, called InstaStock, that made it into Apple's App Store--at least for a limited time.

So what's an IT policymaker to do? Risk-averse organizations will likely insist on tight policies that include app whitelisting and accept that they'll get pushback from users. Those with more liberal policies or that offer personal-device access to only nonsensitive data may elect to sidestep the issue, for now. Our advice: No matter your policy, use an app malware detection system, available from vendors such as McAfee, Symantec, and smaller players such as Lookout, that can be pushed as a mandatory installation via an MDM platform.

As with conventional antivirus packages for PCs, vendors for mobile platform AV must be able to demonstrate accurate detection and fast updates. If something is discovered, anti-malware systems should warn IT. Most MDM systems will allow you to quarantine an infected device until it's remediated.

Grant Moerschel is co-founder of WaveGard, a consulting firm. Write to us at iwletters@techweb.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2130
Published: 2015-03-05
Cisco Secure Access Control Server (ACS) provides an unintentional administration web interface based on Apache Tomcat, which allows remote authenticated users to modify application files and configuration files, and consequently execute arbitrary code, by leveraging administrative privileges, aka B...

CVE-2014-9688
Published: 2015-03-05
Unspecified vulnerability in the Ninja Forms plugin before 2.8.10 for WordPress has unknown impact and remote attack vectors related to admin users.

CVE-2015-0598
Published: 2015-03-05
The RADIUS implementation in Cisco IOS and IOS XE allows remote attackers to cause a denial of service (device reload) via crafted IPv6 Attributes in Access-Accept packets, aka Bug IDs CSCur84322 and CSCur27693.

CVE-2015-0607
Published: 2015-03-05
The Authentication Proxy feature in Cisco IOS does not properly handle invalid AAA return codes from RADIUS and TACACS+ servers, which allows remote attackers to bypass authentication in opportunistic circumstances via a connection attempt that triggers an invalid code, as demonstrated by a connecti...

CVE-2015-0657
Published: 2015-03-05
Cisco IOS XR allows remote attackers to cause a denial of service (RSVP process reload) via a malformed RSVP packet, aka Bug ID CSCur69192.

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.