Deployment of iPads Lessons from the Trenches Jim Horwath March 2012 GIAC GSE, GCUX, GCIA, GCIH, GREM, GSEC, GSIP SANS Technology Institute - Candidate for Master of Science Degree 1 1 Objective Overview of the iPad and the effect it will have on business Security risks of bringing a consumer oriented device such as an iPad into a corporate environment Security and lack of controls on an iPad - what you need to know Operational costs and headaches associated with deploying iPads to users The management nightmare of deploying iPad patching, securing, keeping users safe from themselves This is NOT an explanation concerning iPad forensics SANS Technology Institute - Candidate for Master of Science Degree 2 The iPad Storm • • • • • • Apple’s incredible sales numbers and market penetration Time magazine gave the iPad one of the 50 best inventions of 2010 Medical, legal, and sales staff were early adopters of iPads Apple’s App Store imposes censorship of content causing issues with books and magazines Closed system – but still more applications available for iOS than Androids No support for flash SANS Technology Institute - Candidate for Master of Science Degree 3 Consumer Device – Security an Afterthought • Penetration into Fortune 100 companies and other businesses made iPads THE status symbol Executives see convenience, increased productivity, and freedom Status symbol cost - This addictive appeal has a cost to it – device + monthly fees Default configuration has few security controls e.g. No password Consumers want ease – especially younger users Closed platform - not too much security information available No anti-virus or malware controls SANS Technology Institute - Candidate for Master of Science Degree 4 Policy Is Your Friend • Policy will become your best friend – develop early and involve the right people Acceptable Use Policy (AUP) Change Management Device is meant for employee use only – not spouse, children or relatives Security Awareness Make users aware of common problems Shoulder surfing – gets worse with complex passcodes SANS Technology Institute - Candidate for Master of Science Degree 5 Security Issues - Strengths Hardware encryption uses AES 256-bit encryption APIs with the ability to lock-down access Controlled environment with non-jailbroken devices Applications receive a sandbox and are separate from each other API provides a method for device lock/unlock/password reset/wipe Implementation and engineering guarded IP secret Cellular communications harder (but not impossible) to capture Need to test security controls very thoroughly and keep notes regarding the test results SANS Technology Institute - Candidate for Master of Science Degree 6 SANS Technology Institute - Candidate for Master of Science Degree Security Issues - Challenges Limited number of configurable items There are items the user can change and there is no GPO-like facility to reinforce settings No logging or event log like facility Implementation and engineering guarded IP secret Bluecoat K9 to use as a WEB proxy – but user can choose not to use it – you have to use a 3rd party product to enforce it Companies lose control of data – dropbox, Google docs, iCloud Alphanumeric credentials anywhere on the device echo characters as you type them No warning or acceptable banner, network connectivity is always on SANS Technology Institute - Candidate for Master of Science Degree 8 SANS Technology Institute - Candidate for Master of Science Degree Infrastructure Issues • • • • • • Where do employees sync devices Is your corporate infrastructure ready for iTunes (packaging, updates, etc.) If iPad users sync to corporate assets, is your storage and backup environment ready Is there a business requirement to access internal resources example Citrix for applications Can devices connect internally to wireless infrastructure – how do you control it Data leaves daily with employees and their iPads SANS Technology Institute - Candidate for Master of Science Degree 10 Operational Challenges Keeping iOS current – no mass distribution method iOS 5.0 does allow software updates outside of iTunes Apple provides a low-cost configuration utility iPhone Configuration Utility (ICU) Mobile Device Management (MDM) software is young Creation of a “Gold Image” is difficult iTunes and corporate acceptance Backing up devices onto personal employee assets – who owns the data On corporate owned assets does your infrastructure allow for the additional overhead of iTunes and backups SANS Technology Institute - Candidate for Master of Science Degree 11 More Operational Challenges Blocking pop-ups -- users cannot change it – blocking pop-ups can stop things like SANS OnDemand from working Very confusing with some terms: “Auto-Lock” and “GracePeriod” How do you handle provisioning – corporate vs. personal devices What happens after employee separation, companies cannot verify License cost of software is unknown (productivity software for example) Decreases productivity for some workers SANS Technology Institute - Candidate for Master of Science Degree 12 Hello Help Desk... • • • • • • • Users are scary Problems range from common to the bizarre Calling for device setup – most common Documentation of common problems should be available to users Added cost to train help desk staff on iPad triage Younger help desk staff are better than older staff due to familiarity of the technology Mail stopped and I need it now – the higher up the food chain the more demanding the user SANS Technology Institute - Candidate for Master of Science Degree 13 Enterprise Management of iPads Apple provides iPhone Configuration Utility (ICU) – good for just a few devices and proof of concepts Mobile Device Management (MDM) products are young and lack maturity Some examples: McAfee, Sybase, Good, AirWatch, BoxTone Microsoft Active Sync will allow any device with a valid user name and password to connect Lotus Notes requires granting access to Lotus traveler How does this integrate into your authentication source LDAP/AD/Domino LDAP/Token Do your homework! SANS Technology Institute - Candidate for Master of Science Degree 14 Mobile Device Management (MDM) Software • • • • • • • Policy, awareness, education and AUP are critical Managing a fleet of iPads requires management software MDM market place is emerging and not mature Employees – especially executives - quickly become “addicted” to an iPad, stability is a key issue Apple’s closed platform limits what vendors can do – most vendors do the same thing Managed service versus in-house, versus hybrid Managing a fleet of iPads requires management software SANS Technology Institute - Candidate for Master of Science Degree 15 MDM Lessons • • • • • • • Survey says e-mail and calendaring are the most important applications to an executive Be careful with demonstrations Negotiations - be prepared for push-back on policies from executive – they want convenience and not necessarily security Field communications is critical – leverage company communications and change management process Implement a test environment that is similar to production Be careful of firewall rules if using an in-house managed product Be very careful with destruction capabilities – a mistake can be career ending SANS Technology Institute - Candidate for Master of Science Degree 16 SANS Technology Institute - Candidate for Master of Science Degree Summary Mobile computing is here to stay – learn it, embrace it, and control it the best you can Mobile computing can give your firm a competitive advantage Develop policy based on business need and use cases Continual user education and awareness will go a long way Invest in MDM software to manage devices Avoid being an early adopter SANS Technology Institute - Candidate for Master of Science Degree 18