GPRS - Systems

advertisement
General Packet Radio Service (GPRS) and Personal
Digital Assistant (PDA) Devices
Programme
Sub-Prog /
Project
Prog. Director
Owner
Author
Version Date
NPFIT
Information
Governance
Mark Ferrar
Tim Davis
Graham Packwood
31/03/2006
DOCUMENT RECORD ID KEY
NPFIT-FNT-TO-IG-GPG-0007.01
Version
1.0
Status
APPROVED
General Packet Radio Service (GPRS) and Personal
Digital Assistant (PDA) Devices:
Good Practice Guidelines
© Crown Copyright 2005
Page 1 of 27
GPRS and PDA Devices
NPFIT-FNT-TO-IG-GPG-0007.01
31/03/2006 / Approved / 1.0
Amendment History:
Version
0.1
0.2
1.0
Date
02/09/2005
03/03/2006
31/03/2006
Amendment History
First draft for comment
Technical Author
Approved
Forecast Changes:
Anticipated Change
Annual Review
When
March 2007
Reviewers:
This document must be reviewed by the following.
delegation for sign off.
Name
Malcolm
McKeating
Tim Davis
Signature
Title / Responsibility
IG Security Team
Manager
Head of Information
Governance
Indicate any
Date
Version
1.0
1.0
Approvals:
This document requires the following approvals:
Name
Tim Davis
Signature
Mark Ferrar
© Crown Copyright 2005
Title / Responsibility
Head of Information
Governance
Director Of Technical
Infrastructure
Date
Version
1.0
1.0
Page 2 of 27
GPRS and PDA Devices
NPFIT-FNT-TO-IG-GPG-0007.01
31/03/2006 / Approved / 1.0
Distribution:
Information Governance website: http://nww.connectingforhealth.nhs.uk/
Document Status:
This is a controlled document.
This document version is only valid at the time it is retrieved from controlled
filestore, after which a new approved version will replace it.
On receipt of a new issue, please destroy all previous issues (unless a
specified earlier issue is baselined for use throughout the programme).
Related Documents:
Ref no Doc Reference Number
Title
1
NPFIT-SHR-QMS-PRP-0015 Glossary of Terms
Consolidated.doc
© Crown Copyright 2005
Version
12
Page 3 of 27
GPRS and PDA Devices
NPFIT-FNT-TO-IG-GPG-0007.01
31/03/2006 / Approved / 1.0
Contents
General Packet Radio Service (GPRS) and Personal Digital Assistant
(PDA) Devices: ...............................................................................................1
1 Introduction ................................................................................................5
Abstract.........................................................................................................5
1.1 Aims and Objectives ............................................................................5
1.2 Assumed Reader Knowledge...............................................................5
1.3 Background..........................................................................................6
1.4 Disclaimer ............................................................................................7
2
GPRS System: An Overview......................................................................8
2.1 Connecting to the GSM network using a Laptop..................................8
2.2 Data transfer rates ...............................................................................9
2.3 APN address........................................................................................9
2.4 Accessing your remote network ...........................................................9
2.5 Securing the Data ..............................................................................11
2.6 Encryption Levels...............................................................................13
2.7 Road map to getting connected .........................................................14
3
PDA devices ............................................................................................15
3.1 Overview ............................................................................................15
3.2 Corporate e-mail access ....................................................................16
3.3 Individual PDA / Blackberry user........................................................17
3.4 Approved systems .............................................................................17
4
Risk ..........................................................................................................17
4.1 Contingency Plans and Procedures ...................................................17
4.2 Example Risks ...................................................................................18
5
Summary..................................................................................................19
6
Appendix A. Extracts from BS7799-1:2002.............................................20
7
Appendix B. Microsoft Outlook via GPRS. Tips on data transfer. ..........22
7.1 Microsoft Outlook Online Working......................................................22
7.2 Offline Working ..................................................................................23
7.3 Calendar Functionality .......................................................................24
8
Send and Receive Email..........................................................................24
9
Tips for using a Mobile Web VPN ............................................................24
10
Glossary................................................................................................25
© Crown Copyright 2005
Page 4 of 27
GPRS and PDA Devices
NPFIT-FNT-TO-IG-GPG-0007.01
31/03/2006 / Approved / 1.0
1 Introduction
Abstract
This guide is for both technical and non-technical staff wishing to implement a
General Packet Radio System (GPRS) data connection to a remote private
network, such as N3, via an existing mobile phone provider.
You will find information on:
•
Connecting laptops, mobile phones and Personal Digital Assistants
(PDAs) to N3.
•
The technology used to route data from a remote user into a private
network hosted by a Hospital, Trust or Internet Service Provider (ISP).
•
The benefits to NHS Clinical staff visiting patients at home, e.g.
accessing and amending records remotely.
1.1 Aims and Objectives
The following information provides a knowledge-based framework that will
help maintain best practice values in your own organisation. In using this
guide you will be conforming to best practice and therefore avoid some of the
potential consequences of non-compliance.
After completing this guide you should understand:
•
Good practice for organisations who wish to utilise GPRS technology in
a NHS or other healthcare environments.
•
The connection process and security requirements which should help
ensure confidentiality of data as it transits the Internet to the private
network.
1.2 Assumed Reader Knowledge
•
A basic familiarity with mobile technologies and information security.
•
Detailed technical knowledge is not required.
Further information on GPRS and related matters is available from the
Connecting for Health Information Governance website:
http://nww.connectingforhealth.nhs.uk/igsecurity/
HT
© Crown Copyright 2005
TH
Page 5 of 27
GPRS and PDA Devices
NPFIT-FNT-TO-IG-GPG-0007.01
31/03/2006 / Approved / 1.0
1.3 Background
GPRS is an ‘always on’ data transfer facility currently available from many
(GSM) mobile phone providers. The expansion of the existing mobile phone
infrastructure offers increased data transfer rates to and from a company
intranet via the wider internet community. Sometimes referred to as 2.5G (two
and a half generation), this is a bridging measure prior to a full network
upgrade to 3G (third generation) technology.
Prior to GPRS, data transfer was only available using the Short Message
Service (SMS) ‘text’ message’ service. This facility limited the amount of
transferable data to 160 characters, at a very low transfer rate of 9.6Kbps.
Figure 1 (below) shows the major components that make up a GSM/GPRS
network:
(Fig. 1: Overview of a Wireless Network. Courtesy of Texas Instruments. http://www.ti.com).
HT
TH
•
PSTN: Public Switched Telephone Network – the traditional, wired telephone
network. Copper wire carrying analogue voice data.
•
SGSN: Serving GPRS Support Node - responsible for the delivery of data packets,
from and to the mobile stations, within its geographical service area.
•
GGSN: Gateway GPRS support node - Interface (between the GPRS wireless data
network and other networks such as the Internet or private networks) that converts
the GPRS packets coming from the SGSN into the appropriate packet data protocol.
•
RNC: Radio Network Controller - The RNC carries out radio resource management,
some of the mobility management functions and is the point where encryption takes
place before sending user data to and from the mobile device.
•
BTS: Base Transceiver Station - A mobile phone base station that transmits and
receives signals to and from connected radio network controllers.
© Crown Copyright 2005
Page 6 of 27
GPRS and PDA Devices
NPFIT-FNT-TO-IG-GPG-0007.01
31/03/2006 / Approved / 1.0
1.4 Disclaimer
Reference to any specific commercial product, process or service by trade
name, trademark manufacturer, or otherwise, does not constitute or imply its
endorsement, recommendation, or favouring by NHS Connecting for Health.
The views and opinions of authors expressed within this document shall not
be used for advertising or product endorsement purposes. NHS Connecting
for Health shall also accept no responsibility for any errors or omissions
contained within this document. In particular, NHS Connecting for Health
shall not be liable for any loss or damage whatsoever, arising from the usage
of information contained in this document.
© Crown Copyright 2005
Page 7 of 27
GPRS and PDA Devices
NPFIT-FNT-TO-IG-GPG-0007.01
31/03/2006 / Approved / 1.0
2 GPRS System: An Overview
2.1 Connecting to the GSM network using a Laptop
Mobile phone vendors host GPRS data services. Remote mobile devices,
such as laptop PCs or PDAs, use these services to connect to a corporate or
PCT private network via the wider public Internet.
To utilise the GPRS service, you will require a removable GPRS card that
slots into the laptop PC. Smaller mobile devices such as PDAs have an
inbuilt solution. The exact type of laptop card will depend on the machine
used and the network provider.
A GPRS card, like a mobile phone, contains its own Subscriber Identity
Module (SIM) card and like a mobile phone, requires registration with the
vendor before use. Your vendor should provide suitable guidance on the
registration process. Fig. 2 (below) shows the typical design, size and
placement of a laptop GPRS/3G card:
(Fig. 2: GPRS card for laptop. Courtesy of Vodafone UK. www.vodafone.co.uk).
Together with the GPRS card the vendor should provide software which
controls the connection to the network. This may appear very similar to a
standard 56k Internet dial-up utility with dial in details and log on screen.
Fig. 3 (below) shows a typical example of a log on screen:
Fig. 3 : Example of a Vodafone GPRS log on utility. Details may vary from vendor to vendor.
© Crown Copyright 2005
Page 8 of 27
GPRS and PDA Devices
NPFIT-FNT-TO-IG-GPG-0007.01
31/03/2006 / Approved / 1.0
2.2 Data transfer rates
GPRS is a ‘data transfer only’ service. Different data rates are available for
‘uploading’ data (from mobile device) and ‘downloading’ data (to mobile
device). Data rates come in different sizes and permutations - referred to as
Classes. For example:
Class
Class 2 (2 + 1, 3)
Class 3 (3 + 1, 4)
Class 10 (4+1, 3 + 2)
Receive Data (Kbps)
26.8
40.2
171.2
Send Data (Kbps)
13.4
15.6
21.4
You should consider the type of GPRS applications or services you wish to
utilise via the network. This will help you to determine what transfer rate
best suits you needs.
Your service provider should be able to help with this calculation. Most
vendors charge for the amount of data you send and not for the time
connected to the network.
Please note that the funding of connection agreements is local and not made
through the national program
2.3 APN address
To enable the correct routing of your data, the service provider will allocate
you an Access Point Name (APN) address. The server at this address is
responsible for routing your data packets through the vendor network.
The type of service you subscribe to (e.g. Pay As You Go, Permanent) or the
package required (e.g. web access, email) will determine what connection
settings you will be provided with.
If you sign up for more than one service, you may possibly be required to
enter the APN details when you log on. Alternatively, the vendor may use one
internet address to route your traffic through their network which requires no
user input. Your Trust, hospital or COIN, if running a large account may have
a dedicated APN server.
Each SIM card must have the APN name registered against it. Your vendor
should do this during the registration process
2.4 Accessing your remote network
The purpose of using a GPRS enabled laptop PC is to have immediate
access to your company information: emails, files and folders or intranet.
GPRS alone provides the means to access these applications via the
combined GSM /Internet infrastructure or leased line. Provided your network
© Crown Copyright 2005
Page 9 of 27
GPRS and PDA Devices
NPFIT-FNT-TO-IG-GPG-0007.01
31/03/2006 / Approved / 1.0
will allow remote login and you remember your ‘credentials’, then access is
achievable.
Unfortunately, without any external access controls, or other security
measures, this type of working exposes a network to unacceptable threats
from hackers, unauthorised users and denial of service (DoS) attacks.
The GPRS user and the local NHS network provider have a responsibility to
put in place safeguards against such attacks. One such method is the use of
a Virtual Private Network (VPN). A VPN is a logical, ‘point-to-point’
connection or tunnel, between your mobile device and your remote network.
It is possible to configure the VPN to start from your laptop, or at your service
provider network. This path, once established maintains itself throughout the
session. See Figure 4 (below).
Fig. 4: A typical VPN setup.
A VPN can provide:
•
Remote user identity authentication.
•
Secure private transmission of data (no unauthorised listeners).
•
Verification of the integrity of data transmission.
We recommend a VPN session should commence from your laptop device
and end at your PCT/corporate network.
Your laptop will need VPN client software installed and configured. When
executed, this can establish a connection to your remote VPN network
server.
© Crown Copyright 2005
Page 10 of 27
GPRS and PDA Devices
NPFIT-FNT-TO-IG-GPG-0007.01
31/03/2006 / Approved / 1.0
2.5 Securing the Data
IP tunneling is central to implementing Mobile VPN (MVPN). In addition to
traditional wired VPN features, MVPN includes a set of mechanisms that use
dynamic IP tunneling to support user mobility.
IP tunnels are paths that IP packets follow while encapsulated within the
payload portion of another packet. These encapsulated packets are sent to
destination endpoints from originating endpoints via public (non-secure)
channels.
Tunnels can also exist at the link layer (similar to the Frame Relay model),
providing encapsulation for non-routable protocols, such as Layer 2 Tunneling
Protocol (L2TP) for Point-to-Point Protocol (PPP).
We do not recommend this over GPRS unless your patient data is
encrypted by other means.
There are two basic tunneling methods for implementing IP VPNs:
-
End-to-end or “voluntary”
-
Network-based or “compulsory”
2.5.1 End-to-end Tunnels
End-to-end, voluntary tunnelling technology is the preferred method for
supporting corporate based VPNs. The best example of this is IP Security
(IPSec).
An IPSec tunnel starts from a gateway server. It then matches security
parameters with client-software (distributed by the trust to its mobile users) on
the users PC. The VPN IPSec technology provides a secure tunnel that
extends from the remote clients laptop, via the GPRS backbone, across the
internet, to the gateway. The benefit of this model is the use of standard
TCP/IP protocol stack.
If authentication is successful, the user enters the corporate intranet to access
host computers and services. Voluntary IPSec tunnels include encryption of
all data. IPsec can provide packet encryption and authenticity using a sub-set
of protocols.
Due to this process placing added overhead (often more than 25%) on the
RF interface it is advisable to test your application(s) first before
undertaking a larger scale roll-out program.
© Crown Copyright 2005
Page 11 of 27
GPRS and PDA Devices
NPFIT-FNT-TO-IG-GPG-0007.01
31/03/2006 / Approved / 1.0
If implementing such a solution the Trust or hospital will need to include:
i.
GPRS enabled card for laptop PC.
ii.
Client software on users PCs to enable secure VPN connection.
iii.
A managed Authentication, Access and Accounting (AAA)
server. This would typically be a Remote Access Dial In User
Server (RADIUS).
2.5.2 Network-based tunnels
On the other hand, Network-based “compulsory tunnelling,” provides a more
favourable foundation for mobile VPN solutions.
This method is favoured as it assumes the wireless operator’s network
infrastructure itself features the intelligence and functionality necessary for
the deployment of mobile VPNs. It also presupposes that the air interface
owned by the wireless carriers is secure.
With “compulsory tunnelling,” network components such as access servers,
gateways, etc. (not the mobiles) initiate tunnels, which typically terminate at
the private network. If performance is an issue, then this may be an option.
DoH guidelines require the encryption of Patient Identifiable Data (PID)
under electronic transfer. This offers protection for data, as it flows over the
provider’s network, prior to entering the tunnel.
Application encryption such as TLS is the minimum expected standard.
Multiple subscribers can use compulsory tunnels. These can remain active
even if no subscriber transactions are in progress. This places fewer burdens
on the computing and routing infrastructure.
The compulsory approach to tunnelling also assumes the existence of
proper agreements between corporations or ISPs and wireless operators.
Service Level Agreements address the business relationships between
service providers and corporations, while the Security Associations (SAs)
or shared secrets used to generate IP Security session keys address the
technical relationships.
© Crown Copyright 2005
Page 12 of 27
GPRS and PDA Devices
NPFIT-FNT-TO-IG-GPG-0007.01
31/03/2006 / Approved / 1.0
2.5.3 Encryption
Encryption allows you to create secure connections over insecure channels.
Encrypting your network traffic provides two useful guarantees: privacy and
authentication:
•
The concept of information privacy is simple: the sending end encrypts
the information; this data then travels across the unsecured network.
The receiving end decrypts the information. This process keeps the
data private from someone snooping on the unsecured network.
•
Authentication is also a useful function. If the receiving system is
successfully able to decrypt the data, it knows the data must have
originated from the sending system, and not from a system in the
middle pretending to be the sender.
2.6 Encryption Levels
Encryption can take place at various levels during the transfer of data. The
most common levels are Application and Network:
2.6.1 Application-level encryption
A layer 7 security solution and provides a means of introducing encryption to
your data at a very high level, before it get processed for onward
transmission. Secure Socket Layer (SSL) and Transport Layer Security (TLS)
are similar flavours of an application security mechanism.
Application level encryption may be useful if your users only access a
single application to work in a secure manner. It is worth spending some
time establishing what will be transmitted whether applications and/or data.
DoH guidelines require the encryption of Patient Identifiable Data under
electronic transfer.
2.6.2 Network-level encryption
T
As previously mentioned, a VPN tunnel between the providers network, over
the Internet to the PCT /corporate LAN is an example of implementing
network-level encryption. Encryption of data does not occur until it enters the
tunnel.
For GPRS working with sensitive data, we do not recommend this model
and it is included here for reference only.
© Crown Copyright 2005
Page 13 of 27
GPRS and PDA Devices
NPFIT-FNT-TO-IG-GPG-0007.01
31/03/2006 / Approved / 1.0
2.7 Road map to getting connected
The following should help local IT support staff identify the steps necessary in
establishing a GPRS model for their Trust, Hospital or practice. 1
TPF
FPT
Make contact with a GSM provider and obtain information on the type(s) of
GPRS service available. To date, both Vodafone and Orange have provided
some form of GPRS solution to an NHS organisation. Other vendors should
also be able to provide a similar service.
Typical questions to ask might be:
1. Do you supply GPRS SIM cards for data transfer only?
2. Will you assign a single standalone APN server for our data
forwarding? (This may depend on traffic volume).
3. Do you provide software for laptop connection?
4. What kind of coverage do you have in our geographical area?
5. Can we link a laptop Media Access Control (MAC) address to the
registered SIM card?
6. Do you have any secure, VPN solutions available?
7. Do you have procedures to deal with lost or stolen GPRS cards? Can
you block the SIM card?
8. Will you assign fixed IP addresses for our users to route data via a
leased line or the Internet?
9. Will the Trust, Hospital or practice LAN will connect to the vendor’s
network via a leased line?
You should also:
•
Ensure that you have the necessary protection at the point this line
enters your network. A stand-alone Common Criteria EAL4 level
Firewall is required. Filter on I/Ps
•
Identify the service and application you wish to use. This may require
SSL / TLS encryption or the employment of a VPN solution for the
provision of forwarding Patient Identifiable Data.
1
Please note that these steps are not exhaustive, provide general guidance only and the actual process may vary
from provider to provider.
TP
PT
© Crown Copyright 2005
Page 14 of 27
GPRS and PDA Devices
NPFIT-FNT-TO-IG-GPG-0007.01
31/03/2006 / Approved / 1.0
At nodes of internet access the deployment of an Intrusion Detection
System (IDS) or Intrusion Prevention System (IPS) may be particularly
beneficial. Deployment should include branch sites such as GP surgeries
and health centres if they choose to utilise Internet connectivity rather than
N3.
To ensure that no element of the secure network architecture has been
overlooked a full penetration test performed by a CHECK-approved
tester should be undertaken. This needs to include testing of the VPN
infrastructure and any directly connected system.
Put in place procedures for dealing with a loss or theft of a laptop PC.
(See Section 4, following, for more information).
Further information is available within the Intrusion Detection Systems and
Intrusion Protection Systems: Good Practice Guidelines document.
3 PDA devices
3.1 Overview
Personal Digital Assistant (PDA) is the name for any small hand-held, mobile
device that provides computing as well as information storage and retrieval
capabilities for personal or business use. Often used for keeping calendars
and address book information close-to-hand they also known as a ‘handheld’.
GPRS services via a PDA handheld device, such as a BlackBerry, may
require intervention from an administrator for business use configuration. The
GPRS hardware is already part of the package when purchased. The
configuration of many newer PDA should handle 3G data transfer rates of
around 384Kbps and will fall-back to GPRS rates, should reception or network
coverage dictate. A GPRS enabled PDA will allow you to:
•
Access your email using Microsoft Outlook.
•
•
Browse the web via specially coded pages.
Transfer files.
•
Retrieve contact lists.
As with GSM/GPRS enabled devices, the PDA will contain a SIM card. To
use the PDA, you or your technical support area must first register the device
with your network provider. Not only will you need to register the unit for voice
calls, but additionally for GPRS services.
© Crown Copyright 2005
Page 15 of 27
GPRS and PDA Devices
NPFIT-FNT-TO-IG-GPG-0007.01
31/03/2006 / Approved / 1.0
E-mail is usually one of the most useful components of data transfer via a
PDA unit. The approach to the configuration of your hand held device is
different for corporate and individual users.
3.2 Corporate e-mail access
To access your corporate email – receive internal emails to your BlackBerry in
parallel with your outlook mail tool – you will need to have in place an
agreement for this service with your GPRS network provider.
Once this is established, the next step is to have your network mail server
talking to the BlackBerry network server. Your IT department must establish a
network connection between an internal exchange mail server and the
Blackberry server of your network provider.
To enable secure transfer of any mail traffic, the BlackBerry server will
generate encryption keys using the triple DES algorithm. The keys will be
distributed to both your mail server and the hand held device.
When sending mail to your corporate account, the mail server will: compress a
copy of the message, encrypt it using the generated key and forward it to your
PDA. On receipt of the message, the PDA device, using the same generated
key, will decrypt the message.
The process is the same, except in reverse, for any emails sent from your
PDA device. In order to access your corporate email, you must have an
account on the internal BlackBerry server (internal on your network). See
figure seven (below) which describes a user responding to an email using
their BlackBerry:
1. The user is sent an
email.
2. The email arrives at
the Exchange server and
is forwarded, as normal,
to the user's mailbox.
3. BlackBerry Enterprise
Server
automatically
compresses,
encrypts
and
forwards
the
message to the user's
handheld device.
4. Email is forwarded to
the handheld device via
the Internet and wireless
network.
5. The handheld device
receives decrypts and
decompresses the email.
Fig. Five: User Responds to email using the BlackBerry.
© Crown Copyright 2005
Page 16 of 27
GPRS and PDA Devices
NPFIT-FNT-TO-IG-GPG-0007.01
31/03/2006 / Approved / 1.0
3.3 Individual PDA / Blackberry user
As a non corporate user, when you purchase your PDA, you will register the
unit for voice, email and web services. The network provider should allocate
you an email address. The initial section of the address may be your name the second section is the address of the service provider’s mail server.
During the registration process, you are required to register a password which
enables access to your mail tool via the provider’s hosted web pages. This
web page has the tools required for setting up a mail redirection rule. The
redirection rule will allow you to have any mail sent to your BlackBerry/PDA
email account forwarded to your working mail tool.
Using your workplace Microsoft Outlook account (or similar mail tool), you can
set a reciprocal ‘mail redirection’ rule to forward copies of your email to your
BlackBerry/PDA device.
Unlike the corporate solution, there is no encryption applied by the network
provider.
If patient data is to be accessed guidelines state the mandatory use of
additional encryption to ensure confidentiality.
3.4 Approved systems
BlackBerry products are currently undergoing evaluation tests by the UK
Communications Electronics Security Group (UK CESG) organisation. This
government body provides security advice on network security and other
communications related products.
Following an evaluation, by CESG, on the encryption standard employed by
BlackBerry, a patch or configuration file will be forthcoming. This will
configure security parameters automatically.
It is likely that organisations wishing to employ the accredited security patch
will have to purchase this as an ‘add-on’ to existing systems from BlackBerry.
As yet there is no published timeframe stating when this will be available.
4 Risk
4.1 Contingency Plans and Procedures
N3 user organisations should draw up contingency plans to decide upon their
response to a laptop being lost, stolen, or otherwise compromised. In
© Crown Copyright 2005
Page 17 of 27
GPRS and PDA Devices
NPFIT-FNT-TO-IG-GPG-0007.01
31/03/2006 / Approved / 1.0
particular, how they might handle the possible embarrassment should the
compromise problem enter the public sphere.
As part of the contingency plan, organisations should prepare procedures
for when a user knows or suspects a laptop has been compromised, lost or
stolen.
4.2 Example Risks
There are multiple risks associated with mobile information sources and
multiple access points. The mobility and flexibility provided by GPRS
services, raises additional security concerns. For example:
•
Unauthorised export of information from a domain.
A wrongly
addressed email provides a gateway for data to transfer from a
laptop/GPRS connection to another system.
•
An attacker can subvert a laptop computer by modifying either the
hardware or the software. The computer will then probe, store and
then forward data to the agent.
•
Unauthorised persons view patient Identifiable Data (or other sensitive
NHS data) when a laptop is used in their presence or in a public place
(cybercafé / train).
•
A virus or other malicious code transfers itself from the laptop to the
host system.
•
The laptop hard disk, or removable storage media, is lost or stolen.
As stated in British Standards Institute publication (BS779-1:2002, Para. 9)
[1], “The protection required [for remote working...] should be
commensurate with the risks these specific ways of working cause. When
using mobile computing the risks of working in an unprotected environment
should be considered and appropriate protection applied. In the case of
teleworking the organisation should apply protection to the teleworking site
and ensure that suitable arrangements are in place for this way of
working”.
Appendix A includes further extracts from this document.
© Crown Copyright 2005
Page 18 of 27
GPRS and PDA Devices
NPFIT-FNT-TO-IG-GPG-0007.01
31/03/2006 / Approved / 1.0
5 Summary
GPRS data services offer mobile workers the means to remotely connect to a
private network, using the public communications infrastructure. Many of the
main GSM vendors offer GPRS services. Currently, there are no British
Telecom (BT) N3 catalogue items for GPRS. However, both Orange and
Vodafone currently have solutions in place for certain geographical areas.
If you are a mobile worker and require access to your Intranet to access or
transfer medium size files, then GPRS may be your solution. We strongly
recommend you employ some form of VPN technology and encryption to
secure any patient data.
To use the GPRS service:
•
Identify a suitable vendor.
•
Procure the hardware card and necessary software.
•
Obtain vendor details such as dial in and APN numbers.
•
Select the service and data rate you require.
•
Go through ‘road map’ bullet points / questions (Section 2.7, above).
•
Install VPN software on your mobile and remote server.
•
Ensure your data is secure.
•
Prepare a contingency plan for unplanned loss or theft.
Securing your data through encryption will incur overheads in terms of data
transfer speed. Many of the encryption schemes will ‘encapsulate’ your data
within additional frames.
Many server providers will ask you to employ encryption so that it does not
impact on their published transfer rates. Provided your applications do not
transfer vast amounts of data at any one time, this should not become a
problem.
GPRS coverage in all areas may not be available. You should check this
with your vendor.
Laptop and PDA working offers a robust and flexible solution for mobile
workers. However, it is vitally important to ensure that all data is secure
before commencing deployment.
© Crown Copyright 2005
Page 19 of 27
GPRS and PDA Devices
NPFIT-FNT-TO-IG-GPG-0007.01
31/03/2006 / Approved / 1.0
6 Appendix A. Extracts from BS7799-1:2002 2
Mobile computing and teleworking
Objective: To ensure information security when using mobile computing and
teleworking facilities.
The protection required should be commensurate with the risks these specific
ways of working cause. When using mobile computing the risks of working in
an unprotected environment should be considered and appropriate protection
applied.
In the case of teleworking the organisation should apply protection to the
teleworking site and ensure that suitable arrangement are in place for this way
of working.
Mobile computing
When using mobile computing facilities, e.g. notebooks, palmtops, laptops
and mobile phones, special care should be taken to ensure that business
information is not compromised.
A formal policy should be adopted that takes into account the risks of working
with mobile computing facilities, in particular in unprotected environments.
For example such a policy should include the requirements for physical
protection, access controls, cryptographic techniques, back-ups, and virus
protection. This policy should also include rules and advice on connecting
mobile facilities to networks and guidance on the use of these facilities in
public places.
Care should be taken when using mobile computing facilities in public places,
meeting rooms and other unprotected areas outside of the organisation’s
premises. Protection should be in place to avoid the unauthorised access to
or disclosure of the information stored and processed by these facilities, e.g.
using cryptographic techniques.
It is important that when such facilities are used in public places care is taken
to avoid the risk of overlooking by unauthorised persons. Procedures against
malicious software should be in place and be kept up to date. Equipment
should be available to enable the quick and easy back-up of information.
These back-ups should be given adequate protection against, e.g., theft or
loss of information.
Suitable protection should be given to the use of mobile facilities connected to
networks. Remote access to business information across public network
using mobile computing facilities should only take place after successful
identification and authentication, and with suitable access control mechanisms
in place.
2
For further information on BS 7799 see: http://www.bsi-uk.com/InformationSecurity/index.xalter
© Crown Copyright 2005
Page 20 of 27
GPRS and PDA Devices
NPFIT-FNT-TO-IG-GPG-0007.01
31/03/2006 / Approved / 1.0
Mobile computing facilities should also be physically protected against theft
especially when left, for example, in cars and other forms of transport, hotel
rooms, conference centres and meeting places.
Equipment carrying
important, sensitive and/or critical business information should not be left
unattended and, where possible, should be physically locked away, or special
locks should be used to secure the equipment.
Training should be arranged for staff using mobile computing to raise their
awareness on the additional risks resulting from this way of working and the
controls that should be implemented.
Teleworking
Teleworking uses communications technology to enable staff to work remotely
from a fixed location outside of their organisation.
Suitable protection of the teleworking site should be in place against, e.g., the
theft of equipment and information, the unauthorised disclosure of information,
unauthorised remote access to the organisation’s internal systems or misuse
of facilities. It is important that teleworking is both authorised and controlled
by management, and that suitable arrangements are in place for this way of
working.
Organisations should consider developing a policy, procedures and standards
to control teleworking activities.
Organisations should only authorise
teleworking activities if they are satisfied that appropriate security
arrangements and controls are in place and that these comply with the
organisation’s security policy. The following should be considered:
a) The existing physical security of the teleworking site, taking into
account the physical security of the building and the local environment.
b) The proposed teleworking environment.
c) The communications security requirements, taking into account the
need for remote access to the organisation’s internal systems, the
sensitivity of the information that will be accessed and pass over the
communication link and the sensitivity of the internal system.
d) The threat of unauthorised access to information or resources from
other people using the accommodation, e.g. family and friends.
The controls and arrangements to be considered include:
a) The provision of suitable equipment and storage furniture for the
teleworking activities.
b) A definition of the work permitted, the hours of work, the
classification of information that may be held and the internal systems
and services that the teleworker is authorised to access.
© Crown Copyright 2005
Page 21 of 27
GPRS and PDA Devices
NPFIT-FNT-TO-IG-GPG-0007.01
31/03/2006 / Approved / 1.0
c) The provision of suitable communication equipment, including
methods for securing remote access.
d) Physical security.
e) Rules and guidance on family and visitor access to equipment and
information.
f) The provision of hardware and software support and maintenance.
g) The procedures for back-up and business continuity.
h) Audit and security monitoring.
i) Revocation of authority, access rights and the return of equipment
when the teleworking activities cease.
7 Appendix B. Microsoft Outlook via GPRS. Tips on
data transfer.
7.1 Microsoft Outlook Online Working
The majority of people, who use Microsoft Outlook to access their email when
they are in the office, operate in online mode. When people work online,
Outlook maintains a ’live‘ connection to the server during the entire working
session.
People who access their email via a remote connection, using GPRS, and
who have tried to operate in online mode have almost certainly been subject
to a very different user experience:
•
Depending on the number of new emails that are available it can be
several minutes before the inbox is ’ready for inspection‘.
•
It can take a great deal of time to synchronise folders.
•
Sending and receiving emails with large attachments can be frustrating
because the Outlook client is unusable until the email has been sent or
received.
GPRS users should limit their online sessions to only those situations that
require them to create and edit rules, using the Out of Office Assistant and
editing offline settings.
© Crown Copyright 2005
Page 22 of 27
GPRS and PDA Devices
NPFIT-FNT-TO-IG-GPG-0007.01
31/03/2006 / Approved / 1.0
7.2 Offline Working
Offline is a more efficient way to work in dial-up situations, such as when the
GPRS bearer is being utilised. Working offline, users can take a single folder
or a subset of folders (e.g. calendar, contacts, deleted items, drafts, inbox,
journal, notes, outbox or sent items) from a server location and work with the
contents - without being connected to the network.
When users are ready to update the folders on the Exchange server with any
changes made offline, they ’synchronise‘ the two locations to make the
contents of both sets of folders identical.
Users may find it useful to configure Outlook so that the connection to the
server lasts just long enough to copy over any changes and disconnects
itself when this task is completed.
Only the offline changes users have made need copying across to the server
while newly received email messages (and all other all changes to information
on the server) will download to the user.
If users open one of these items in an offline folder, Outlook will not download
it again. Any deletion from either the offline folder or the corresponding server
folder applies to both folders. Once synchronisation is completed, Outlook
disconnects from the server and users work with the information in the offline
folders on their computer.
The following should help achieve the best offline performance:
•
Synchronise address book changes only. Address books may be very
large so it is not good practice to download the entire address book
each time a synchronisation action takes place. Outlook should be setup to download only the changes that have occurred since the previous
synchronisation.
•
Synchronise only the folders that are required.
Instead of
synchronising all folders configure Outlook to only process the
essential folders.
Using Microsoft Outlook 2000 it is possible to define which folders should be
synchronised.
The product provides a ’Mail and Calendar’ quick
synchronisation group as standard:
•
Use the Send/Receive option to send and receive new email.
•
Use the ’synchronise this folder’ option to synchronise the calendar
function. Select Tools and then Synchronise. Finally, click the This
Folder option.
All the ’standard‘ Microsoft folders (e.g. calendar, contacts, deleted items,
drafts, inbox, etc) can be synchronised by selecting the All Folders option
© Crown Copyright 2005
Page 23 of 27
GPRS and PDA Devices
NPFIT-FNT-TO-IG-GPG-0007.01
31/03/2006 / Approved / 1.0
under the Synchronise item. However, this method transfers much larger
amounts of data in comparison to only synchronising the sending and
receiving of email.
7.3 Calendar Functionality
It is possible to configure Microsoft Outlook to automatically synchronise the
calendar folder on a regular basis. This ensures the publicly viewable
calendar is up to date. It is also possible for the user to choose to
synchronise the calendar folder manually, as and when required.
8 Send and Receive Email
When people work offline it is likely that they will wish to send email messages
they have created and check for new emails from other people. In order to
send and receive email, users can select the Send/Receive option on the
mail client. Note that the status of messages (read or unread) may not be
updated in this case, so to avoid confusion it is always preferable to
synchronise the Inbox wherever possible.
Users may find the following information useful when sending and receiving
email:
•
Users can choose to synchronise individual folders, such as the inbox
or outbox, at any time by choosing ‘Synchronise this Folder’ on the mail
client. Select Tools and then the Synchronise option and then click
on the This Folder item.
•
Outlook can be particularly useful as it allows a user to configure
folders to synchronise, at regular intervals, without further user
intervention.
The amount of data that will be transferred during a full synchronisation is
dependent on how much work has been done since the last synchronisation
operation was performed e.g. how many e-mails have been received and
transferred, how many calendar updates have occurred etc. The figures
below give “a feel” for how much data will be transferred if nothing has
changed if Outlook 2000 is being used (e.g. if the client and server folders are
the same):
9 Tips for using a Mobile Web VPN
By its nature, a VPN solution will prevent any form of interference to the flow
of data in the interests of maintaining a high level of security. This is one of
the positive aspects of using a VPN.
© Crown Copyright 2005
Page 24 of 27
GPRS and PDA Devices
NPFIT-FNT-TO-IG-GPG-0007.01
31/03/2006 / Approved / 1.0
In the mobile world this can manifest itself as service disruption. If for
instance the GPRS connection is temporarily unavailable (e.g. train goes
through a tunnel), the VPN session may be dropped, as the VPN solution
perceives this to be a form of interference.
We therefore recommend that users keep this in mind when using the VPN while mobile.
10 Glossary
AAA:
Authentication, Access and Accounting. A framework for
configuring services that provide a secure network
connection and a record of user activity, by identifying
who the user is, what the user can access, and what
services and resources the user is consuming.
APN:
Access Point Name.
SGSN and GGSN.
BT:
British Telecommunications Plc is the current service
provider for the N3 network.
DoS:
Denial of Service attack.
An attack designed to
functionally cripple network functionality by flooding it with
useless traffic.
GSM:
Global System for Mobile Communications. The de-facto
wireless telephone standard in Europe.
GPRS:
General Packet Radio Service. A packet-based wireless
communication service promising data rates up to 115
Kbps and continuous connection to the Internet for mobile
phone and computer users. It is particularly suited for
sending and receiving small bursts of data, such as email
and web browsing, as well as large volumes of data.
IDS:
Intrusion Detection System.
An Intrusion Detection
System monitors any network traffic and logs/notifies any
possible malicious activity.
IPS:
Intrusion Prevention System. Any device which exercises
access control to protect computers from exploitation.
Intrusion prevention systems also have the ability to take
immediate action, based on a set of rules established by
the network administrator.
© Crown Copyright 2005
Provides routing information for
Page 25 of 27
GPRS and PDA Devices
NPFIT-FNT-TO-IG-GPG-0007.01
31/03/2006 / Approved / 1.0
IPSec:
Internet Protocol Security. A method of securing IP
communications for security that takes place at the
network or packet processing layer of network
communication.
ISP:
Internet Service Provider. A company that provides an
Internet connection
L2TP:
Layer 2 Tunnelling Protocol. A tunnelling protocol used to
support virtual private networks (VPNs).
MAC:
Media Access Control. A unique identifier used to
provide security for wireless networks. All Wi-Fi devices
have an individual MAC address hard-coded into it.
MVPN:
Mobile Virtual Private Network. VPN solution for mobile
devices.
PID:
Patient Identifiable Data. Key identifiable information
includes: patient’s name, address, full post code, date of
birth, pictures, photographs, videos, audio-tapes or other
images of patients. PID also encompasses NHS local
patient identifiable codes or anything else that could
identify a patient directly or indirectly. For example, rare
diseases, drug treatments or statistical analyses which
have very small numbers within small population may
allow the identification of individuals.
PDA:
Personal Digital Assistant. A handheld device that
combines computing, telephone/fax, Internet and
networking features.
PPP:
Point to Point Protocol. A data transfer protocol which
operates at the Data Link Layer.
RADIUS:
Remote Access Dial In User Server. An Authentication,
Authorization and Accounting (AAA) protocol that
enables remote access servers to communicate with a
central server to authenticate dial-in users and authorize
their access to the requested system or service.
SA:
Security Association. A relationship between two or more
entities that describes how they will utilise security
services to communicate securely
© Crown Copyright 2005
Page 26 of 27
GPRS and PDA Devices
NPFIT-FNT-TO-IG-GPG-0007.01
31/03/2006 / Approved / 1.0
SIM:
Subscriber Identity Module. The SIM card is the smart
card inserted inside all GSM phones that encrypts voice
and data transmissions and stores data about the specific
user so that the user can be identified and authenticated
to the network supplying the phone service. The SIM
also stores data such as personal phone settings specific
to the user and phone numbers.
SMS:
Short Message Service. A service for sending text based
messages of up to 160 characters.
SSL:
Secure Sockets Layer. A protocol designed to provide
secure communications across the Internet.
TLS:
Transport Layer Security. A protocol designed to provide
secure communications across the Internet designed as a
successor to SSL. It uses the same cryptographic
methods but supports more cryptographic algorithms.
UK CESG:
UK Communications Electronics Security Group. CESG
aims to protect and promote the vital interests of the UK
by providing advice and assistance on the security of
communications
and
electronic
data.
See
http://www.cesg.gov.uk/index.cfm for further details.
VPN:
Virtual Private Network. A private data network that
makes use of the public telecommunication infrastructure;
privacy is maintained through the use of a tunnelling
protocol and security procedures.
© Crown Copyright 2005
Page 27 of 27
Download