security - Mobile Work Exchange

advertisement
Streamlined Application Management
The Intersection of Cloud and Mobility
Anil Karmel
Deputy Chief Technology Officer
National Nuclear Security Administration
There is a perfect
storm of
disruptive
.
technology on
the horizon that
will enable a
leaner, smarter
government
Cloud
Computing
Big Data/
Analytics
Mobility
Social
Computing
2
People
Processes
Technology
Architecture
Cybersecurity
Operations
Policy
3
DOE IaaS Business Use Cases
Rapid
deployment
of servers
to scientists
Security
controls
based on
data
sensitivity
Calculating
energy
savings
Disaster
Recovery
Capital
Expenditure
Reduction
DOE SaaS Business Use Cases
Social
Computing
Web
Conferencing
Instant
Messaging
Enterprise
Mobility
A Cloud of Clouds approach brokering any organization, through any device, to any
service respectful of site autonomy; powered by the innovation of the National
Labs
DOE Cloud
On-Premise
Cloud
NNSA Cloud
Other Gov’t
Agency Cloud
Public Cloud
INSIGHT
FEATURES
• Green & Business
IT Smart Meters
• PortfolioStat
• Enterprise
Architecture
• Data Center
Consolidation
DOE Federal
Users
Services Broker
* Powered by
General Public
Users
developed by LANL
Laboratory &
Plant Users
Other Gov’t
Agecy Users
Support
Contractors
• Virtual Desktops &
Servers
• Enterprise
Application Store
• Enterprise
Certification &
Accreditation
Services Broker Enclaves
Organization: DOE Customer
SITES
On Premise Cloud
Public Cloud
DOE Cloud
Public
Websites
CFO
Hypervisor
Shared
Services
Open Science
Network
VDI
Compute
Remediation
Storage
Delivering a comprehensive platform for
on-the-go worker capabilities
MOBILITY
Challenge
 Deploying modern wireless technology is incredibly difficult
within government
 Multiple federal approvals are required that slow speed to
impact or block progress all together
 Customers demand devices they are most familiar with yet
show little interest in devices we are comfortable with
securing
 True wireless automation and a connected government are
years, if not decades away
To make mobility real…
Data must be
available
everywhere
while limiting where it goes
Rethink Mobility
Data
 There are two main strategies for
data security: Virtualization and
Containerization. Secure the
data not the device.
Location
 Employees must be able to work
how they want, where they want,
on the device of their choosing.
Transport
 You don’t truly understand your
risk until you understand your
transport.
National Lab Case Study
• Why Enterprise Mobility?
– Problems we need to solve
• RIM Blackberry
– Security Posture
– Accomplishments and Statistics
• Apple iPad and Google Android
– Good Mobile
– Other Use Cases
• Key Takeaways & Considerations
Why Enterprise Mobility?
Where’s the right balance?
• Key Issues
– Malware
– Application Architecture
– Mobile Content Delivery
• Key Considerations
– Corporate vs. Personally owned devices
– Help Desk Support
National Lab Case Study: Blackberry
Current Environment
• Security
– Secured with DISA/DoD Secure Technical
Implementation Guide
– Transmissions & Data fully encrypted (FIPS
140-2 compliant)
• Devices
– Blackberry with no camera or WiFi
• Ability to remotely wipe a Blackberry if it
is lost or stolen
National Lab Case Study: Blackberry
Deployment Security Posture
• Blackberry can’t connect to a foreign wireless network (no
WiFi)
• Only a Lab-supplied SIM can be used on the device
• No third party applications allowed
• USB port and microSD card slot disabled
• Blackberry “Home” Screen locked on all smartphones
• Web Traffic routed through Lab infrastructure
• 24/7 phone number to call if Blackberry is lost or stolen
Apple iPad and Google Android
Consumer-Oriented devices in the Enterprise
End users demand functionality – IT requires security
How does IT deliver solutions and yet
secure consumer-oriented devices?
National Lab Case Study: Good Mobile
Apple iPad and Google Android
• Enterprise-class Email, Calendar & Contacts
 Consistent feature set across all platforms
 Message indicators for reply/forward, high importance,
meeting invites, etc.
 Accept/Decline meeting requests from Inbox and view
conflicts
 Access to Global Address List (GAL)
• Launcher Bar
 Provides quick access to apps
National Lab Case Study: Good Mobile
Security Posture
• Security
– Secured with DISA/DoD Secure Technical
Implementation Guide
– Transmission & data fully encrypted (FIPS 140-2
compliant)
• Devices
– Android and Apple iOS Devices
• Secure Enterprise Container
– IT keeps corporate data secure
– End users get to keep their personal apps
– Ability to remotely wipe the application / data if it is lost
or stolen
Apple iPad
Additional Use Case
Remote access to
your Desktop
• Virtual Desktop
Interface availability
• Remote Desktop
Client for iPad
(Physical Desktops)
People
Change How
People Behave
 Bring Your Own Device  Collaboration
 Mobile/Virtual Worker  Mobile Applications
 Enterprise Mobility Policy
 Risk Management Framework
 Enterprise C&A and Procurements
Technology
Evolve our
Capabilities
Processes
Change How
We Do Things
 802.11 everywhere
 App Store
 VDI and
Containerization
 Mobile App
Management
Key Takeaways &
Considerations
• What’s Your Security Posture?
• Create Cross-Functional Teams
– Technical
– Customer
• Manage User Expectations
– Give users new features rather than take them away
– Start small, scale quickly
Anil Karmel
Deputy Chief Technology Officer
NNSA
Anil.Karmel@nnsa.doe.gov
Download