informa
/
Endpoint
Commentary

The Browser Is the New Endpoint

Given the role browsers play in accessing enterprise applications and information, it's time to rethink how we classify, manage, and secure them.

Asked to name their critical network endpoints, most IT pros would cite mobile devices, laptops, desktops, and servers. A few might include wearables and other emerging end-user hardware. Browsers, though, probably wouldn't make the list. After all, they're applications that run on the endpoints, not endpoints themselves. But given the valuable role browsers play in accessing enterprise applications and information, it's time to rethink how we classify them and, as a result, how we manage and secure them.

Evolution into an Endpoint
Initially, web browsers accessed data from a web server — HTML documents and images, maybe some video — and rendered it in a single page. As companies placed new demands on the web, browser functionality was supplemented by operating system resources and full-blown applications like Adobe Flash Player and Java.

The supplemental technologies gave browser users a better, more consistent experience that included streaming video and access to offline storage. However, they also gave criminals more vulnerabilities to exploit and more ways to attack the enterprise.

HTML5, the latest version of the HTML standard, goes a long way in addressing the security and other functional challenges posed earlier. Basically, HTML5 eliminates the need for Flash, Java and other add-ons, plug-ins, and third-party software components. Now, everything is handled by the browser itself.

Once Google, Microsoft, Mozilla, and other vendors implemented HTML5 in their browsers, software-as-a-service applications started leveraging HTML5's platform-neutral functionalities in favor of earlier, platform-specific technologies. In addition to a better user experience, HTML5 has fostered an explosion in enterprise-based, rich Internet applications.

HTML5 has also created a thriving ecosystem of browser extensions that improve the experience of Chrome, Firefox, Edge, and other HTML5 browser users. With extensions, users don't install full-blown software components on their devices. Instead, extensions install directly in the browser, typically enhancing the browser interface rather than introducing an additional user interface. In turn, end users can install and use extensions on their own, without IT support.

Browser Endpoint Challenges
With browsers at the center of so much corporate activity, they are now subject to many of the same challenges that face desktops, smartphones, and other hardware-based endpoints.

The first challenge concerns leaking sensitive corporate data. For example, many end users wind up using the same browser — on the same computer — for personal and professional purposes. Personal email, banking, shopping, and other unauthorized applications can compromise sensitive enterprise data as well as personal information. Typically, such applications aren't monitored and don't meet corporate security standards, and data is subject to loss or theft as a result.

Second, the number of surface attacks grows along with the number of browser extensions installed. Those extensions can read all the data exchanged between the device's browser and the back-end server. While users think the extensions are secure, they can leave users and their companies at risk of cryptojacking, ransomware, and other malware attacks that target one computer and then spread to other systems in the corporate network.

Finally, most companies are going to manage a hybrid application environment that combines HTML5 and legacy technologies. Not every enterprise application is going to move to the cloud immediately. Rebuilding and redeploying apps takes a lot of time. For many organizations, both types of applications will be used at the same time. And many organizations will have to manage legacy HTML4 applications.

Managing and Securing the Browser Endpoint
To meet the challenges above, IT teams need to manage their browser endpoints with the same professionalism they use to manage other endpoints. Teams need to manage not only their browsers but also the extensions as well as the plug-ins and add-ons used by older browsers and keep all of those technologies up to date. They need visibility to determine what should be given access to which resources and what should be restricted.

Teams also need to apply critical browser controls and harden browsers. Some vendors offer enterprise editions of their browsers, which include policy engines that govern the applications and extensions they can use, data security and privacy, and browsing experience. To harden the browsers, IT teams need to set bookmarks, the homepage, and trusted websites as well as tweak configurations to increase privacy and security.

Likewise, the activity of browsers and browser extensions needs to be sandboxed to prevent data being leaked to unintended third parties. When the same browser is used to conduct both personal and professional business, the data must be secured and managed to prevent leakage. For instance, users should not be able to download work documents from Office 365 and attach them to an email in their personal Gmail account.

Last, the team needs to allow corporate data access from trusted devices and restrict usage of untrusted devices for corporate purposes. When end users use their personal computers and devices to do company business, there's a good chance their hardware doesn't meet company security standards. Is the computer protected by a strong password? Is it running antivirus software? Have all the software updates and patches been applied? Bottom line, we need to make sure that corporate data is accessed from approved browsers and from trusted devices.

Given its central position in the enterprise, the browser needs to be rethought. It's more than another application. It's the hub of corporate collaboration, communication, and business operations. As such, the browser has evolved into an endpoint and now requires the heightened management and security applied to its hardware-based counterparts.

 

Black Hat Europe returns to London Dec. 3-6, 2018, with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions, and service providers in the Business Hall. Click for information on the conference and to register.

Recommended Reading:
Editors' Choice
Amichai Shulman, CTO and Co-founder of AirEye
Biagio DeSimone, Enterprise Solution Architect, Aqua Security