A framework for auditing mobile devices Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. © 2010 Baker Tilly Virchow Krause, LLP Learning objectives ˃ Understand different approaches for managing mobile devices including centralized, decentralized, and BYOD management ˃ Identify the impacts of mobile devices at organization ˃ Critically analyze mobile device risks using a framework focused on people, devices, applications/websites, and data ˃ Define key mobile device controls to incorporate into audit work plans 2 Contents ˃ ˃ ˃ ˃ ˃ ˃ ˃ Define mobile & BYOD Impacts of mobile devices at organizations Risks and internal audit considerations Key mobile device management controls A framework for mobile device auditing Examples of environment Resources Define mobile & BYOD Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International © 2010 Baker Tilly Virchow Krause, LLP 4 Why do we care? ˃ Mobile is here, no going back to being tethered to a desk ˃ Mobile allows great productivity and flexibility to achieve organizational objectives ˃ Mobile employees are happier (so “they” say) ˃ Mobile can save money (maybe?) Why is mobile the future? ˃ A Cisco study says in 2014 the average number of connected devices per knowledge worker will reach an average of 3.3 devices, up from 2.8 in 2012 ˃ Gartner predicts by 2017, half of employers will require employees to supply their own device for work purposes What is a mobile device? NIST (SP 800-124) – characteristics: ˃ ˃ ˃ ˃ Small form factor Wireless network interface for internet access Local built-in (non-removable) data storage Operating system that is not a full-fledged desktop/laptop operating system ˃ Apps available through multiple methods ˃ Built-in features for synchronizing local data What is a mobile device? NIST – optional characteristics: ˃ Wireless personal area network interfaces (e.g., Bluetooth, near-field communications) ˃ Cellular network interfaces ˃ GPS ˃ Digital camera ˃ Microphone ˃ Support for removable media ˃ Support for using the device itself as removable storage What is a mobile device? Any easily portable technology that allows for the storage and transmittal of your organization’s data Examples: ˃ ˃ ˃ ˃ Phones Tablets Laptops External hard drives (e.g., USB thumb drives) ˃ Cameras (e.g., point and shoot) ˃ Logistics devices (e.g., GPS Tracking devices, RFID) ˃ eReaders ˃ Digital music players (e.g., iPods) ˃ Medical devices (e.g., pacemakers) ˃ Smartwatches and glasses What is BYOD? ˃ Bring Your Own Device ˃ Supported by organization systems and applications that allow multiple type of devices to access those services ˃ Powered by the internet BYOD – pros & cons Pros: ˃ Reduced upfront costs ˃ Employee satisfaction ˃ Potentially greater functionality for users Cons: ˃ Unmanaged devices with your organization’s data ˃ Mingling of personal and organizational data ˃ Managing legal requirements (e.g., eDiscovery) BYOD in the Enterprise—A Holistic Approach, ISACA JOURNAL, Volume 1, 2013 Risks and internal audit considerations Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International © 2010 Baker Tilly Virchow Krause, LLP 13 Major security concerns (NIST) ˃ ˃ ˃ ˃ ˃ ˃ ˃ Lack of physical security controls Use of untrusted mobile devices Use of untrusted networks Use of apps created by unknown parties Interaction with other systems Use of untrusted content Use of location services What are the mobile device risks? NIST characteristics Illustrative risks Small form factor Loss or theft of data Wireless network interface for internet access Exposure to untrusted and unsecured networks Local built-in (non-removable) data storage Loss or theft of data Operating system that is not a fullfledged desktop/laptop operating system Reduced technical controls Apps available through multiple methods Exposure to untrusted and malicious apps Built-in features for synchronizing local data Interactions with other untrusted and unsecured systems What are the mobile device risks? NIST characteristics Illustrative risks Wireless personal area network interfaces (e.g., Bluetooth, near-field communications) Exposure to untrusted and unsecured networks Cellular network interfaces Exposure to untrusted and unsecured networks GPS Exposure of private information Digital camera Exposure of private information Microphone Exposure of private information Support for removable media Loss or theft of data Support for using the device itself as removable storage Interactions with other untrusted and unsecured systems IA considerations – scoping Does your organization have a mobile device strategy, including: ˃ ˃ ˃ ˃ ˃ Alignment with organizational strategy/objectives Risk assessment(s) for mobility Definition of devices Policies governing the use of devices (with penalties) Security standards based on data IA considerations – scoping (cont.) ˃ Who owns these devices, organization or employee? ˃ Who is responsible for managing and securing the devices? ˃ Incident response procedures ˃ Antivirus / antimalware software ˃ Who is paying for devices and service plans? ˃ Does that change responsibilities? ˃ What are the legal and regulatory requirements for your organization and the jurisdictions you operate in? Identifying owners and stakeholders ˃ Who is your client? ˃ Who are the stakeholders? ˃ General Counsel ˃ Chief Information Officer ˃ Chief Information Security Officer ˃ Chief Operations Officer ˃ Chief Compliance Officer ˃ Chief Privacy Officer ˃ Chief Risk Officer ˃ Other functions with a stake in privacy and security (e.g., human resources, sales) Understanding the organization ˃ ˃ ˃ ˃ ˃ Mission and objectives Organization and responsibilities Customers Types of data Exchanges of data ˃ Interdepartmental ˃ Third parties ˃ Interstate or international ˃ Data collection, usage, retention, and disclosure ˃ Systems (e.g., websites, apps) Assessing risk ˃ ˃ ˃ ˃ ˃ ˃ ˃ Leveraging management’s risk assessments Consultation with legal counsel Regulatory risk Legal/contractual risk Industry self-regulatory initiatives Constituency relations and perceptions Public relations Where’s the GRC? Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International © 2010 Baker Tilly Virchow Krause, LLP 22 Old model ˃ Protect everything in my office network with physical and logical controls over access ˃ Then we added laptops and pushed the network out of the office using VPNs ˃ That doesn’t work any more with phones and tablets, especially when they are owned by the employee Framework – benefits ˃ Flexible – audit all at once or in parts ˃ Adaptable – scope it how you want it ˃ Inclusive – make use of other standards/frameworks (e.g., COBIT, ISO 27002, NIST) ˃ ISACA’s Bring Your Own Device (BYOD) Security Audit/Assurance Program Mobile device framework Data Websites & Apps Devices People Mobile device framework ˃ ˃ ˃ ˃ Data Websites & apps Devices People Mobile device framework – data ˃ Data (i.e., data generated, accessed, modified, transmitted, stored or used electronically by the organization) is essential to the organization's objectives and requires protection for a variety of reasons, including legal and regulatory requirements. ˃ Examples: ˃ ˃ ˃ ˃ ˃ Messages (e.g., emails, text messages, instant messages) Voice Pictures Files (e.g., attachments) Hidden (e.g., GPS) Building the framework – data types DATA Data Data Data Data Data © Baker Tilly Virchow Krause, LLP WEB & APPS DEVICES PEOPLE Mobile device framework – data ˃ Classification tiers ˃ Data owners/stewards ˃ Data inventory Mobile device framework – data – audit considerations ˃ Determine the types of data that can be accessed or stored on mobile devices. Assess restrictions in place to safeguard data. ˃ Review the data classification security policy to ensure specificity to the various types of data, based on sensitivity. ˃ Use/create an inventory of data, identify the applications and websites where it can be accessed, and determine who will take ownership of the data moving forward. Mobile device framework – data – audit considerations ˃ Determine if authentication and security requirements or restrictions are or should be established for each data type ˃ Determine if “Legal Hold” requirements are documented and align with data classification and then mobile device security Building the framework – data: classification WEB & APPS DATA Data Confidential Data Restricted Data Data Data © Baker Tilly Virchow Krause, LLP Internal Use Public DEVICES PEOPLE Data – audit considerations from ISACA’s work program ˃ 8.1.2 Data Access ˃ 8.1.4 Encryption and Data Protection Mobile device framework – websites & apps ˃ Websites and applications (i.e., tools used to process electronic data) require security controls, regardless of the device used for access, to protect the confidentiality, integrity, and availability of data. Mobile device framework – websites & apps examples Types Business Personal Websites/portals •Outlook web access •Business intranet •Google •Yahoo •ESPN Cloud services •Google services •Salesforce.com •Microsoft Office 365 •Gmail •Flickr •Facebook App stores •Apple app store •Google marketplace •Amazon app store •Custom corporate stores •Apple app store •Google marketplace •Amazon app store Custom built apps & sites •Business specific •Entertainment •Hacking/malicious Virtual desktop environments/remote desktop tools •Citrix •VMware •GoToMyPC •VNC Building the framework – web & apps WEB & APPS DATA Data Confidential Data App Web Restricted Data App Internal Use Data Web Public Data © Baker Tilly Virchow Krause, LLP App DEVICES PEOPLE Mobile device framework – web/apps – audit considerations ˃ Determine the websites and applications that are used on mobile devices to access data, and determine whether they are approved. Assess how websites and applications are secured to protect data. ˃ Review all applications and websites accessible via mobile devices to ensure they comply with security policies (e.g., encryption requirements, storage restrictions, access permissions). Building the framework – web & apps DATA WEB & APPS Data App Confidential Data Web Restricted Data App Internal Use Data Web Public Data © Baker Tilly Virchow Krause, LLP App DEVICES PEOPLE Web/App – audit considerations from ISACA’s work program ˃ 8.1.6 Malware Protection ˃ 9.1.3 Secure Software Distribution Mobile device framework – devices ˃ Devices (i.e., hardware used to access websites and applications for data processing) require an increasing variety of security controls due to the increased mobility, choice, functionality, and replacement of these products. Mobile device framework – devices ˃ Managed vs. unmanaged ˃ Business vs. employee owned Mobile device framework – devices ˃ Encryption ˃ Data transfers (e.g., sending and syncing) ˃ Logical security (e.g., linkage to HR, passwords, access management) ˃ Physical security ˃ Network architecture (e.g., configuration, monitoring) ˃ Mobile device management (***more later) Mobile device framework – devices – audit considerations ˃ Determine the types of mobiles devices that are used to access data, and whether each mobile device is supported. Assess how mobile devices are secured to protect data. ˃ Ensure that both organization managed and personally owned mobile devices that access confidential or high-risk data are secured with appropriate security controls. Building the framework – devices DATA WEB & APPS DEVICES Data App Phone Web Tablet App Laptop Confidential Data Restricted Data Internal Use Data Web Public Data © Baker Tilly Virchow Krause, LLP App PEOPLE Device – audit considerations from ISACA’s work program ˃ ˃ ˃ ˃ ˃ 8.1.1 Device Access Restrictions 8.1.3 Explicit Permission to Wipe Data 8.1.4 Encryption and Data Protection 8.1.5 Remote Access 8.2.1 Network Access Device – audit considerations from ISACA’s work program ˃ 9.1.1 Mobile Device Management (MDM) is Deployed ˃ 9.1.2 Central Management of BYOD Devices ˃ 9.1.4 Monitoring of BYOD Usage ˃ 9.1.5 Interfaces to Other Systems ˃ 9.1.6 Remote Management Mobile device framework – people ˃ People (i.e., employees that process data via websites and applications through a variety of devices) require frequent communications and trainings on the risks, policies, practices, and tools for protecting the confidentiality, integrity, and availability of data. Mobile device framework – people ˃ Risk assessment ˃ Policies, procedures, standards ˃ Training and awareness programs with acknowledged roles and responsibilities ˃ Monitoring Mobile device framework – people – audit considerations ˃ Determine if an overarching mobile device security policy exists. ˃ Assess existing policies and procedures that guide the procurement, use, support, and management of mobile devices. ˃ Determine who uses mobile devices to access data, and who supports and manages those mobile devices that access data. Mobile device framework – people – audit considerations ˃ Advise departments on creating supplementary mobile device security practices as needed. ˃ Assess formalized training and awareness programs that inform mobile device users of the risks involved and their personal responsibilities when accessing information. ˃ Are employees OK with you wiping their device? ˃ What happens to personal data on the device? Mobile device framework – people – audit considerations ˃ Labor laws (Exempt vs. Non-exempt, union) ˃ Employment contracts ˃ OSHA ˃ Tax laws (reimbursements for devices, services) ˃ Export control laws (travel) ˃ Record management laws ˃ Fair Credit Reporting Act ˃ Local jurisdiction laws (of employee’s residence) Mobile device framework – people – employee agreement ˃ ˃ ˃ ˃ ˃ ˃ ˃ ˃ Eligibility Applicable company policies Data storage and backup Data and device management Legal hold notice Hardware support (theft, loss, damage) Software support Travel and physical security Mobile device framework – people – employee training ˃ ˃ ˃ ˃ ˃ ˃ ˃ ˃ Define BYOD/MDM for your organization Onboarding device process Roles/responsibilities Expense reimbursements/stipends Security policies Data ownership policies Practical app use with organization data Tech support From Techrepublic.com Building the framework – people DATA WEB & APPS DEVICES PEOPLE Data App Phone Policy Web Tablet Agreement Confidential Data Restricted Data Practices App Laptop Procedures Internal Use Data Web Practices App Risk Assessment Public Data © Baker Tilly Virchow Krause, LLP People – audit considerations from ISACA’s work program ˃ ˃ ˃ ˃ ˃ ˃ ˃ 2.1.1 BYOD Initial Risk Assessment 2.1.2 BYOD Ongoing Risk Assessment 3.1.1 Employee BYOD Agreement 3.1.2 Mobile Acceptable Use Policy (MAUP) 3.1.3 Human Resources (HR) Support for BYOD 3.1.4 Contractors 3.2.1 Exemptions from BYOD policies People – audit considerations from ISACA’s work program ˃ 4.1.1 Legal Involvement in BYOD Policies and Procedures ˃ 4.1.2 Legal Hold ˃ 5.1.1 Help Desk ˃ 6.1.1 Policy Approval ˃ 6.1.2 Monitoring BYOD Execution ˃ 7.1.1 Initial Training ˃ 7.1.2 Security and Awareness Training What is mobile device management? ˃ Process for managing mobile devices, including policies, procedures, training, and systems and ˃ Industry term for software tools used to centrally administer mobile devices, specifically for security purposes Types of mobile device management processes (Gartner) ˃ ˃ ˃ ˃ Control-oriented Choice-oriented Innovation-oriented Hands-off What do MDM tools do? (Gartner) ˃ ˃ ˃ ˃ Software management Network service management Hardware management Security management **Focus of these tools is phones and tablets; some support laptops, but other device types are not typically supported MDM tools market (Gartner) ˃ MDM tools market estimated $784 million market ˃ About 128 or more firms in the market ˃ MDM tools projected to be $1.6-billion market by 2014 ˃ Market penetration estimated at less than 30 percent MDM tools prices (Gartner) ˃ Three years ago = $60 to $150 per device ˃ Today = under $30 per device ˃ Traditional endpoint protection = $10 to $15 per seat Mobile device management and the framework ˃ Cuts across all four parts of the framework ˃ Data – some ability to restrict access ˃ Websites & apps – blacklisting, whitelisting, ˃ ˃ deployment Devices – implement system controls People – use of MDM must align with policies (especially HR and legal areas) Key features of MDM tools ˃ Centralize device management through policy and configuration management ˃ Control both corporate owned and personally owned devices ˃ SaaS and on-premises delivery models Key features of MDM tools ˃ Still require thorough testing: ˃ ˃ ˃ ˃ ˃ ˃ Connectivity Protection Authentication Application functionality Logging Performance management Two main flavors of MDM tools ˃ Messaging server based (e.g., Microsoft Exchange) ˃ Limited control enforcement ˃ Limited support for devices ˃ Third party provided (e.g., Airwatch, Mobileiron, Good) ˃ Additional costs and licenses required ˃ Another application to support and manage When would you use MDM? ˃ ˃ ˃ ˃ ˃ BYOD Data encryption Multiple device operating systems Security breach impact Existing end point tools don’t work for mobile devices MDM – audit considerations from ISACA’s work program (9.1.2) ˃ A secure portal for BYOD users to enroll and provision their devices ˃ Centralized security policy enforcement ˃ Remotely lock and wipe data and installed apps ˃ Inventory devices, operating systems (OSs), patch levels, organization and third-party apps, and revision levels ˃ Distribution whitelists and blacklists MDM – audit considerations from ISACA’s work program ˃ Permission-based access controls for access to the organization’s networks and data ˃ Selective wipe and privacy policies for organization apps and data, i.e., sandboxing ˃ Distribution and management of digital certificates (to encrypt and digitally sign emails and sensitive documents) ˃ Role-based access groups with fine-grained access control policies and enforcement ˃ Over-the-air (OTA) distribution of software (apps, patches, updates) and policy changes MDM – audit considerations from ISACA’s work program ˃ Postpone automatic updates from Internet service providers (ISPs), e.g., in cases where an automatic OS update may cause critical apps to fail ˃ Secure logs and audit trails of all sensitive BYOD activities ˃ Capability to locate and map lost phones for recovery ˃ Backup and restore BYOD device data ˃ Remove or install profiles based on geographic location, to ensure compliance with relevant foreign legislation, e.g., data privacy and security MDM – audit considerations from ISACA’s work program ˃ When BYOD devices attempt to connect to the organization’s networks, the MDM system automatically checks: ˃ Patch levels for OSs and apps ˃ Required security software is active and current, i.e., ˃ ˃ ˃ ˃ antivirus, firewall, full-disk encryption, etc. Device is not jailbroken (Apple) or rooted (Android) Presence of unapproved devices (if any) Presence of blacklisted apps If any of the above login checks fail, the MDM can automatically update the device concerned (e.g., patch levels) or disallow access. MDM – audit considerations from ISACA’s work program ˃ Don’t forget to the secure the MDM system itself ˃ 9.2.1 MDM Application Security Building the framework – complete DATA WEB & APPS DEVICES PEOPLE Data App Phone Policy Web Tablet Agreement Confidential Data Restricted Data Practices App Internal Use Data Laptop Procedures MDM Web Practices App Risk Assessment Public Data MDM © Baker Tilly Virchow Krause, LLP Major security concerns (NIST) – mapped to framework area Security Concern Data Websites & Apps Device People s Physical security controls X X Untrusted mobile devices X X Untrusted networks X X Untrusted apps X X Interaction with other systems X X Untrusted content X X Location services X X X X X X X X Examples of environments Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International © 2010 Baker Tilly Virchow Krause, LLP 74 Example – no BYOD DATA WEB & APPS DEVICES PEOPLE HR HR Phone Policy Financial Tablet Agreement Confidential IF Restricted Customer Practices CRM Internal Use Other Laptop Procedures MDM Web Training Email Risk Assessment Public MDM - Process & Technology © Baker Tilly Virchow Krause, LLP Example – mixed devices, controls by type MDM - Tech WEB & APPS DATA Customer Employee Confidential Restricted CRM Custom Built Ops DEVICES Confidential Restricted Phone Tablet PEOPLE Practices MDM Policy Agreement Internal Use Trade Secrets HR/FIN Internal Use Marketing Phone Public Training Practices Internal Use Email Procedures Public Web Public © Baker Tilly Virchow Krause, LLP Laptop Tablet Risk Assessment Example – owned & BYOD with controls MDM - Tech WEB & APPS DATA Customer Confidential HR OWNED Confidential PEOPLE Phone Policy Practices Restricted Employee Restricted FIN Tablet MDM Agreement Public Other Public Document Management MDM - Tech Procedures BYOD Confidential Email Phone Practices Training Restricted Public © Baker Tilly Virchow Krause, LLP Tablet MDM Risk Assessment Resources Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International © 2010 Baker Tilly Virchow Krause, LLP 78 Resources ˃ ˃ ˃ ˃ BankInfoSecurity, BYOD: Get Ahead of the Risk, Intel CISO: Policy, Accountability Created Positive Results, January 2012 Digital Services Advisory Group and Federal Chief Information Officers Council, Bring Your Own Device, A Toolkit to Support Federal Agencies Implementing Bring Your Own Device (BYOD) Programs, August 2012 Gartner, Magic Quadrant for Mobile Device Management, May 2012 Gartner, Gartner Says Consumerization Will Drive At Least Four Mobile Management Styles, November 2011 Resources ˃ ˃ National Institute of Standards and Technology, Special Publication 800-124 Revision 1 (Draft), Guidelines for Managing and Securing Mobile Devices in the Enterprise, July 2012 National Institute of Standards and Technology, Special Publication 800-144, Guidelines on Security and Privacy in Public Cloud Computing, December 2011 Resources ˃ BYOD audit/assurance program ˃ ˃ www.isaca.org/auditprograms Securing mobile devices using COBIT® 5 for information security ˃ www.isaca.org/Securing-Mobile-Devices