SlideShare a Scribd company logo
Mobility WebCastiPhone and iPad Security Simon Guest Director, Mobility Solutions Neudesic, LLC simon.guest@neudesic.com
Common Questions I don’t want my employees doing [x].  How do I configure policy? What happens if I leave my device on the [bus|train|plane]? How do I secure communication from the device? I’m writing an application.  How do I make my application secure? What other bad stuff should I be thinking about?
2 3 4 5 1 Policy Data Network Application Bad Stuff Agenda
2 3 4 5 1 Policy Data Network Application Bad Stuff Agenda I don’t want my employees doing [x] on their device.   How do I configure policy?
Policy Passcode Policy ,[object Object]
Prompts user for code, entered on startup and wake
With no code, emergency calls onlyConfiguring on the Device ,[object Object]
Simple (4 pin) or Complex (Alphanumeric)
Wipe on x incorrect attempts (default 10)
Used in combination with auto-lock,[object Object]
Allow simple (4 digit PIN) or alphanumeric
Passcode length (1 – 16 chars)
Minimum number of complex characters
Minimum passcode age (None/1 – 730 days)
Auto lock (None/1-5 mins)
Passcode history (None/1-50 passcodes)
Grace period for device lock (None to 4 hrs)
Max number of failed attempts (4 – 16),[object Object]
Allow simple (4 digit PIN) or alphanumeric
Passcode length (1 – 16 chars)
Minimum number of complex characters
Minimum passcode age (None/1 – 730 days)
Auto lock (None/1-5 mins)
Passcode history (None/1-50 passcodes)
Grace period for device lock (None to 4 hrs)
Max number of failed attempts (4 – 16),[object Object]
Allow simple (4 digit PIN) or alphanumeric
Passcode length (1 – 16 chars)
Minimum number of complex characters
Minimum passcode age (None/1 – 730 days)
Auto lock (None/1-5 mins)
Passcode history (None/1-50 passcodes)
Grace period for device lock (None to 4 hrs)
Max number of failed attempts (4 – 16),[object Object]
Defaults to 4 digit pin code, entered on startup and wakeDevice Settings ,[object Object]
Simple (4 pin) or Complex (Alphanumeric)
Wipe on x incorrect attempts (default 10)
Used in combination with auto-lock,[object Object]
Policy Restrictions on Device Features ,[object Object],Restrictions on Applications ,[object Object],Content Rating Restrictions ,[object Object],[object Object]
VPN
Email
ActiveSync
LDAP Directory
CalDAV
CardDAV

More Related Content

What's hot

Pentesting web applications
Pentesting web applicationsPentesting web applications
Pentesting web applicationsSatish b
 
Spikes Security Isla Isolation
Spikes Security Isla IsolationSpikes Security Isla Isolation
Spikes Security Isla Isolation
Cybryx
 
Mobile Device Mismanagement
Mobile Device MismanagementMobile Device Mismanagement
Mobile Device Mismanagement
breenmachine
 
Android Application Penetration Testing - Mohammed Adam
Android Application Penetration Testing - Mohammed AdamAndroid Application Penetration Testing - Mohammed Adam
Android Application Penetration Testing - Mohammed Adam
Mohammed Adam
 
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
Rapid7
 
Hacking and securing ios applications
Hacking and securing ios applicationsHacking and securing ios applications
Hacking and securing ios applicationsSatish b
 
Security testing in mobile applications
Security testing in mobile applicationsSecurity testing in mobile applications
Security testing in mobile applications
Jose Manuel Ortega Candel
 
Presentacion Palo Alto Networks
Presentacion Palo Alto NetworksPresentacion Palo Alto Networks
Presentacion Palo Alto Networks
Laurent Daudré-Vignier
 
Mobile security
Mobile securityMobile security
Mobile security
Stefaan
 
Hacking and Securing iOS Apps : Part 1
Hacking and Securing iOS Apps : Part 1Hacking and Securing iOS Apps : Part 1
Hacking and Securing iOS Apps : Part 1
Subhransu Behera
 
(Pdf) yury chemerkin hackfest.ca_2013
(Pdf) yury chemerkin hackfest.ca_2013(Pdf) yury chemerkin hackfest.ca_2013
(Pdf) yury chemerkin hackfest.ca_2013STO STRATEGY
 
Andersson Elffers Felix integrates physical and digital access with SafeNet e...
Andersson Elffers Felix integrates physical and digital access with SafeNet e...Andersson Elffers Felix integrates physical and digital access with SafeNet e...
Andersson Elffers Felix integrates physical and digital access with SafeNet e...
SafeNet
 
(Pptx) yury chemerkin hacker_halted_2013
(Pptx) yury chemerkin hacker_halted_2013(Pptx) yury chemerkin hacker_halted_2013
(Pptx) yury chemerkin hacker_halted_2013STO STRATEGY
 
Astaro Customer presentation
Astaro Customer presentationAstaro Customer presentation
Astaro Customer presentation
ronhashjr
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
BAKOTECH
 
(Pdf) yury chemerkin hacktivity_2013
(Pdf) yury chemerkin hacktivity_2013(Pdf) yury chemerkin hacktivity_2013
(Pdf) yury chemerkin hacktivity_2013STO STRATEGY
 
iOS Application Penetration Testing
iOS Application Penetration TestingiOS Application Penetration Testing
iOS Application Penetration Testing
n|u - The Open Security Community
 
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015
Ajin Abraham
 
Взаимодействие с Check Point Technical Support
Взаимодействие с Check Point Technical SupportВзаимодействие с Check Point Technical Support
Взаимодействие с Check Point Technical Support
Group of company MUK
 
Check Point NGFW
Check Point NGFWCheck Point NGFW
Check Point NGFW
Group of company MUK
 

What's hot (20)

Pentesting web applications
Pentesting web applicationsPentesting web applications
Pentesting web applications
 
Spikes Security Isla Isolation
Spikes Security Isla IsolationSpikes Security Isla Isolation
Spikes Security Isla Isolation
 
Mobile Device Mismanagement
Mobile Device MismanagementMobile Device Mismanagement
Mobile Device Mismanagement
 
Android Application Penetration Testing - Mohammed Adam
Android Application Penetration Testing - Mohammed AdamAndroid Application Penetration Testing - Mohammed Adam
Android Application Penetration Testing - Mohammed Adam
 
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
 
Hacking and securing ios applications
Hacking and securing ios applicationsHacking and securing ios applications
Hacking and securing ios applications
 
Security testing in mobile applications
Security testing in mobile applicationsSecurity testing in mobile applications
Security testing in mobile applications
 
Presentacion Palo Alto Networks
Presentacion Palo Alto NetworksPresentacion Palo Alto Networks
Presentacion Palo Alto Networks
 
Mobile security
Mobile securityMobile security
Mobile security
 
Hacking and Securing iOS Apps : Part 1
Hacking and Securing iOS Apps : Part 1Hacking and Securing iOS Apps : Part 1
Hacking and Securing iOS Apps : Part 1
 
(Pdf) yury chemerkin hackfest.ca_2013
(Pdf) yury chemerkin hackfest.ca_2013(Pdf) yury chemerkin hackfest.ca_2013
(Pdf) yury chemerkin hackfest.ca_2013
 
Andersson Elffers Felix integrates physical and digital access with SafeNet e...
Andersson Elffers Felix integrates physical and digital access with SafeNet e...Andersson Elffers Felix integrates physical and digital access with SafeNet e...
Andersson Elffers Felix integrates physical and digital access with SafeNet e...
 
(Pptx) yury chemerkin hacker_halted_2013
(Pptx) yury chemerkin hacker_halted_2013(Pptx) yury chemerkin hacker_halted_2013
(Pptx) yury chemerkin hacker_halted_2013
 
Astaro Customer presentation
Astaro Customer presentationAstaro Customer presentation
Astaro Customer presentation
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
 
(Pdf) yury chemerkin hacktivity_2013
(Pdf) yury chemerkin hacktivity_2013(Pdf) yury chemerkin hacktivity_2013
(Pdf) yury chemerkin hacktivity_2013
 
iOS Application Penetration Testing
iOS Application Penetration TestingiOS Application Penetration Testing
iOS Application Penetration Testing
 
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015
Hacking Samsung's Tizen: The OS of Everything - Hack In the Box 2015
 
Взаимодействие с Check Point Technical Support
Взаимодействие с Check Point Technical SupportВзаимодействие с Check Point Technical Support
Взаимодействие с Check Point Technical Support
 
Check Point NGFW
Check Point NGFWCheck Point NGFW
Check Point NGFW
 

Viewers also liked

iPhone/iPad开发讲座 第二讲 iPhone用户界面设计
iPhone/iPad开发讲座 第二讲 iPhone用户界面设计iPhone/iPad开发讲座 第二讲 iPhone用户界面设计
iPhone/iPad开发讲座 第二讲 iPhone用户界面设计Hao Peiqiang
 
Apple iPhone and iPad at IBM
Apple iPhone and iPad at IBMApple iPhone and iPad at IBM
Apple iPhone and iPad at IBM
Chris Sparshott
 
iPhone Development Overview
iPhone Development OverviewiPhone Development Overview
iPhone Development Overview
William Taysom
 
Penetration testing of i phone-ipad applications
Penetration testing of i phone-ipad applicationsPenetration testing of i phone-ipad applications
Penetration testing of i phone-ipad applications
shehab najjar
 
CSS - OOCSS, SMACSS and more
CSS - OOCSS, SMACSS and moreCSS - OOCSS, SMACSS and more
CSS - OOCSS, SMACSS and more
Russ Weakley
 
The iPhone Evolution
The iPhone EvolutionThe iPhone Evolution
The iPhone Evolution
Thomas C. A. Tandberg Brevik
 
Marketing Mix of Apple iPhone
Marketing Mix of Apple iPhoneMarketing Mix of Apple iPhone
Marketing Mix of Apple iPhone
Pratik Shah
 
State of the Word 2011
State of the Word 2011State of the Word 2011
State of the Word 2011
photomatt
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving Cars
LinkedIn
 
Hype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerHype vs. Reality: The AI Explainer
Hype vs. Reality: The AI Explainer
Luminary Labs
 
Build Features, Not Apps
Build Features, Not AppsBuild Features, Not Apps
Build Features, Not Apps
Natasha Murashev
 

Viewers also liked (12)

iPhone/iPad开发讲座 第二讲 iPhone用户界面设计
iPhone/iPad开发讲座 第二讲 iPhone用户界面设计iPhone/iPad开发讲座 第二讲 iPhone用户界面设计
iPhone/iPad开发讲座 第二讲 iPhone用户界面设计
 
Apple iPhone and iPad at IBM
Apple iPhone and iPad at IBMApple iPhone and iPad at IBM
Apple iPhone and iPad at IBM
 
iPhone Development Overview
iPhone Development OverviewiPhone Development Overview
iPhone Development Overview
 
Penetration testing of i phone-ipad applications
Penetration testing of i phone-ipad applicationsPenetration testing of i phone-ipad applications
Penetration testing of i phone-ipad applications
 
CSS - OOCSS, SMACSS and more
CSS - OOCSS, SMACSS and moreCSS - OOCSS, SMACSS and more
CSS - OOCSS, SMACSS and more
 
The iPhone Evolution
The iPhone EvolutionThe iPhone Evolution
The iPhone Evolution
 
M11 Manual
M11 ManualM11 Manual
M11 Manual
 
Marketing Mix of Apple iPhone
Marketing Mix of Apple iPhoneMarketing Mix of Apple iPhone
Marketing Mix of Apple iPhone
 
State of the Word 2011
State of the Word 2011State of the Word 2011
State of the Word 2011
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving Cars
 
Hype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerHype vs. Reality: The AI Explainer
Hype vs. Reality: The AI Explainer
 
Build Features, Not Apps
Build Features, Not AppsBuild Features, Not Apps
Build Features, Not Apps
 

Similar to iPhone and iPad Security

LANDesk Mobility Manager
LANDesk Mobility ManagerLANDesk Mobility Manager
LANDesk Mobility ManagerInfraVision
 
Mobility manager 90
Mobility manager 90Mobility manager 90
Mobility manager 90
Axle-IT
 
iOS-Application-Security-iAmPr3m
iOS-Application-Security-iAmPr3miOS-Application-Security-iAmPr3m
iOS-Application-Security-iAmPr3m
Prem Kumar (OSCP)
 
R U aBLE? BLE Application Hacking
R U aBLE? BLE Application HackingR U aBLE? BLE Application Hacking
R U aBLE? BLE Application Hacking
Tal Melamed
 
ISSE Mobile Device Policy Enforcement
ISSE Mobile Device Policy EnforcementISSE Mobile Device Policy Enforcement
ISSE Mobile Device Policy Enforcement
John Rhoton
 
Simplify Security And Device Management Final Pres10 23final
Simplify Security And Device Management Final Pres10 23finalSimplify Security And Device Management Final Pres10 23final
Simplify Security And Device Management Final Pres10 23final
jasonlan
 
Mobile, IoT, Clouds… It’s time to hire your own risk manager!
Mobile, IoT, Clouds… It’s time to hire your own risk manager!Mobile, IoT, Clouds… It’s time to hire your own risk manager!
Mobile, IoT, Clouds… It’s time to hire your own risk manager!
DefCamp
 
Presentatie McAfee: Optimale Endpoint Protection 26062015
Presentatie McAfee: Optimale Endpoint Protection 26062015Presentatie McAfee: Optimale Endpoint Protection 26062015
Presentatie McAfee: Optimale Endpoint Protection 26062015
SLBdiensten
 
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
mike parks
 
Cyber security for journalists
Cyber security for journalistsCyber security for journalists
Cyber security for journalists
Shanmugavel Sankaran
 
Why Go Beyond Encryption
Why Go Beyond EncryptionWhy Go Beyond Encryption
Why Go Beyond Encryption
guest990c6c
 
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
ITExamAnswers.net
 
Information security questions
Information security questions Information security questions
Information security questions
gamemaker762
 
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
jasonlan
 
Mobile Forensics on a Shoestring Budget
Mobile Forensics on a Shoestring BudgetMobile Forensics on a Shoestring Budget
Mobile Forensics on a Shoestring Budget
Brent Muir
 
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Cisco do Brasil
 
Are Your Mobile Apps Secure? (Part I)
Are Your Mobile Apps Secure? (Part I)Are Your Mobile Apps Secure? (Part I)
Are Your Mobile Apps Secure? (Part I)
Nagarro
 
Preventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint SecurityPreventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint Security
Intel IT Center
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009
Zernike College
 
Tips and Tricks for Building Secure Mobile Apps
Tips and Tricks for Building Secure Mobile AppsTips and Tricks for Building Secure Mobile Apps
Tips and Tricks for Building Secure Mobile Apps
TechWell
 

Similar to iPhone and iPad Security (20)

LANDesk Mobility Manager
LANDesk Mobility ManagerLANDesk Mobility Manager
LANDesk Mobility Manager
 
Mobility manager 90
Mobility manager 90Mobility manager 90
Mobility manager 90
 
iOS-Application-Security-iAmPr3m
iOS-Application-Security-iAmPr3miOS-Application-Security-iAmPr3m
iOS-Application-Security-iAmPr3m
 
R U aBLE? BLE Application Hacking
R U aBLE? BLE Application HackingR U aBLE? BLE Application Hacking
R U aBLE? BLE Application Hacking
 
ISSE Mobile Device Policy Enforcement
ISSE Mobile Device Policy EnforcementISSE Mobile Device Policy Enforcement
ISSE Mobile Device Policy Enforcement
 
Simplify Security And Device Management Final Pres10 23final
Simplify Security And Device Management Final Pres10 23finalSimplify Security And Device Management Final Pres10 23final
Simplify Security And Device Management Final Pres10 23final
 
Mobile, IoT, Clouds… It’s time to hire your own risk manager!
Mobile, IoT, Clouds… It’s time to hire your own risk manager!Mobile, IoT, Clouds… It’s time to hire your own risk manager!
Mobile, IoT, Clouds… It’s time to hire your own risk manager!
 
Presentatie McAfee: Optimale Endpoint Protection 26062015
Presentatie McAfee: Optimale Endpoint Protection 26062015Presentatie McAfee: Optimale Endpoint Protection 26062015
Presentatie McAfee: Optimale Endpoint Protection 26062015
 
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
 
Cyber security for journalists
Cyber security for journalistsCyber security for journalists
Cyber security for journalists
 
Why Go Beyond Encryption
Why Go Beyond EncryptionWhy Go Beyond Encryption
Why Go Beyond Encryption
 
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
 
Information security questions
Information security questions Information security questions
Information security questions
 
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
 
Mobile Forensics on a Shoestring Budget
Mobile Forensics on a Shoestring BudgetMobile Forensics on a Shoestring Budget
Mobile Forensics on a Shoestring Budget
 
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)
 
Are Your Mobile Apps Secure? (Part I)
Are Your Mobile Apps Secure? (Part I)Are Your Mobile Apps Secure? (Part I)
Are Your Mobile Apps Secure? (Part I)
 
Preventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint SecurityPreventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint Security
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009
 
Tips and Tricks for Building Secure Mobile Apps
Tips and Tricks for Building Secure Mobile AppsTips and Tricks for Building Secure Mobile Apps
Tips and Tricks for Building Secure Mobile Apps
 

More from Simon Guest

10 Life Hacks for Better Productivity
10 Life Hacks for Better Productivity10 Life Hacks for Better Productivity
10 Life Hacks for Better Productivity
Simon Guest
 
Building a Great Engineering Culture
Building a Great Engineering CultureBuilding a Great Engineering Culture
Building a Great Engineering Culture
Simon Guest
 
Interviewing Techniques
Interviewing TechniquesInterviewing Techniques
Interviewing Techniques
Simon Guest
 
Presentation Anti-Patterns
Presentation Anti-PatternsPresentation Anti-Patterns
Presentation Anti-Patterns
Simon Guest
 
10 Life Hacks for Better Productivity
10 Life Hacks for Better Productivity10 Life Hacks for Better Productivity
10 Life Hacks for Better Productivity
Simon Guest
 
Automated Web Testing using JavaScript
Automated Web Testing using JavaScriptAutomated Web Testing using JavaScript
Automated Web Testing using JavaScript
Simon Guest
 
Advanced Tips & Tricks for using Angular JS
Advanced Tips & Tricks for using Angular JSAdvanced Tips & Tricks for using Angular JS
Advanced Tips & Tricks for using Angular JS
Simon Guest
 
Indoor location in mobile applications using iBeacons
Indoor location in mobile applications using iBeaconsIndoor location in mobile applications using iBeacons
Indoor location in mobile applications using iBeacons
Simon Guest
 
Creating Context-Aware Applications
Creating Context-Aware ApplicationsCreating Context-Aware Applications
Creating Context-Aware Applications
Simon Guest
 
Automated Testing using JavaScript
Automated Testing using JavaScriptAutomated Testing using JavaScript
Automated Testing using JavaScript
Simon Guest
 
Enterprise Social Networking - Myth or Magic?
Enterprise Social Networking - Myth or Magic?Enterprise Social Networking - Myth or Magic?
Enterprise Social Networking - Myth or Magic?
Simon Guest
 
Objective View of MEAPs
Objective View of MEAPsObjective View of MEAPs
Objective View of MEAPs
Simon Guest
 
Top Ten Tips for HTML5/Mobile Web Development
Top Ten Tips for HTML5/Mobile Web DevelopmentTop Ten Tips for HTML5/Mobile Web Development
Top Ten Tips for HTML5/Mobile Web Development
Simon Guest
 
Windows Azure Toolkit for iOS
Windows Azure Toolkit for iOSWindows Azure Toolkit for iOS
Windows Azure Toolkit for iOSSimon Guest
 
Developing Enterprise-Grade Mobile Applications
Developing Enterprise-Grade Mobile ApplicationsDeveloping Enterprise-Grade Mobile Applications
Developing Enterprise-Grade Mobile Applications
Simon Guest
 
My customers are using iPhone/Android, but I'm a Microsoft Guy.
My customers are using iPhone/Android, but I'm a Microsoft Guy.My customers are using iPhone/Android, but I'm a Microsoft Guy.
My customers are using iPhone/Android, but I'm a Microsoft Guy.
Simon Guest
 
Developing iPhone and iPad apps that leverage Windows Azure
Developing iPhone and iPad apps that leverage Windows AzureDeveloping iPhone and iPad apps that leverage Windows Azure
Developing iPhone and iPad apps that leverage Windows Azure
Simon Guest
 
Building solutions on the Microsoft platform that target iPhone, iPad, and An...
Building solutions on the Microsoft platform that target iPhone, iPad, and An...Building solutions on the Microsoft platform that target iPhone, iPad, and An...
Building solutions on the Microsoft platform that target iPhone, iPad, and An...
Simon Guest
 
Future of Mobility
Future of MobilityFuture of Mobility
Future of Mobility
Simon Guest
 
Patterns for Cloud Computing
Patterns for Cloud ComputingPatterns for Cloud Computing
Patterns for Cloud Computing
Simon Guest
 

More from Simon Guest (20)

10 Life Hacks for Better Productivity
10 Life Hacks for Better Productivity10 Life Hacks for Better Productivity
10 Life Hacks for Better Productivity
 
Building a Great Engineering Culture
Building a Great Engineering CultureBuilding a Great Engineering Culture
Building a Great Engineering Culture
 
Interviewing Techniques
Interviewing TechniquesInterviewing Techniques
Interviewing Techniques
 
Presentation Anti-Patterns
Presentation Anti-PatternsPresentation Anti-Patterns
Presentation Anti-Patterns
 
10 Life Hacks for Better Productivity
10 Life Hacks for Better Productivity10 Life Hacks for Better Productivity
10 Life Hacks for Better Productivity
 
Automated Web Testing using JavaScript
Automated Web Testing using JavaScriptAutomated Web Testing using JavaScript
Automated Web Testing using JavaScript
 
Advanced Tips & Tricks for using Angular JS
Advanced Tips & Tricks for using Angular JSAdvanced Tips & Tricks for using Angular JS
Advanced Tips & Tricks for using Angular JS
 
Indoor location in mobile applications using iBeacons
Indoor location in mobile applications using iBeaconsIndoor location in mobile applications using iBeacons
Indoor location in mobile applications using iBeacons
 
Creating Context-Aware Applications
Creating Context-Aware ApplicationsCreating Context-Aware Applications
Creating Context-Aware Applications
 
Automated Testing using JavaScript
Automated Testing using JavaScriptAutomated Testing using JavaScript
Automated Testing using JavaScript
 
Enterprise Social Networking - Myth or Magic?
Enterprise Social Networking - Myth or Magic?Enterprise Social Networking - Myth or Magic?
Enterprise Social Networking - Myth or Magic?
 
Objective View of MEAPs
Objective View of MEAPsObjective View of MEAPs
Objective View of MEAPs
 
Top Ten Tips for HTML5/Mobile Web Development
Top Ten Tips for HTML5/Mobile Web DevelopmentTop Ten Tips for HTML5/Mobile Web Development
Top Ten Tips for HTML5/Mobile Web Development
 
Windows Azure Toolkit for iOS
Windows Azure Toolkit for iOSWindows Azure Toolkit for iOS
Windows Azure Toolkit for iOS
 
Developing Enterprise-Grade Mobile Applications
Developing Enterprise-Grade Mobile ApplicationsDeveloping Enterprise-Grade Mobile Applications
Developing Enterprise-Grade Mobile Applications
 
My customers are using iPhone/Android, but I'm a Microsoft Guy.
My customers are using iPhone/Android, but I'm a Microsoft Guy.My customers are using iPhone/Android, but I'm a Microsoft Guy.
My customers are using iPhone/Android, but I'm a Microsoft Guy.
 
Developing iPhone and iPad apps that leverage Windows Azure
Developing iPhone and iPad apps that leverage Windows AzureDeveloping iPhone and iPad apps that leverage Windows Azure
Developing iPhone and iPad apps that leverage Windows Azure
 
Building solutions on the Microsoft platform that target iPhone, iPad, and An...
Building solutions on the Microsoft platform that target iPhone, iPad, and An...Building solutions on the Microsoft platform that target iPhone, iPad, and An...
Building solutions on the Microsoft platform that target iPhone, iPad, and An...
 
Future of Mobility
Future of MobilityFuture of Mobility
Future of Mobility
 
Patterns for Cloud Computing
Patterns for Cloud ComputingPatterns for Cloud Computing
Patterns for Cloud Computing
 

Recently uploaded

Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 

Recently uploaded (20)

Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 

iPhone and iPad Security

  • 1. Mobility WebCastiPhone and iPad Security Simon Guest Director, Mobility Solutions Neudesic, LLC simon.guest@neudesic.com
  • 2. Common Questions I don’t want my employees doing [x]. How do I configure policy? What happens if I leave my device on the [bus|train|plane]? How do I secure communication from the device? I’m writing an application. How do I make my application secure? What other bad stuff should I be thinking about?
  • 3. 2 3 4 5 1 Policy Data Network Application Bad Stuff Agenda
  • 4. 2 3 4 5 1 Policy Data Network Application Bad Stuff Agenda I don’t want my employees doing [x] on their device. How do I configure policy?
  • 5.
  • 6. Prompts user for code, entered on startup and wake
  • 7.
  • 8. Simple (4 pin) or Complex (Alphanumeric)
  • 9. Wipe on x incorrect attempts (default 10)
  • 10.
  • 11. Allow simple (4 digit PIN) or alphanumeric
  • 12. Passcode length (1 – 16 chars)
  • 13. Minimum number of complex characters
  • 14. Minimum passcode age (None/1 – 730 days)
  • 17. Grace period for device lock (None to 4 hrs)
  • 18.
  • 19. Allow simple (4 digit PIN) or alphanumeric
  • 20. Passcode length (1 – 16 chars)
  • 21. Minimum number of complex characters
  • 22. Minimum passcode age (None/1 – 730 days)
  • 25. Grace period for device lock (None to 4 hrs)
  • 26.
  • 27. Allow simple (4 digit PIN) or alphanumeric
  • 28. Passcode length (1 – 16 chars)
  • 29. Minimum number of complex characters
  • 30. Minimum passcode age (None/1 – 730 days)
  • 33. Grace period for device lock (None to 4 hrs)
  • 34.
  • 35.
  • 36. Simple (4 pin) or Complex (Alphanumeric)
  • 37. Wipe on x incorrect attempts (default 10)
  • 38.
  • 39.
  • 40. VPN
  • 41. Email
  • 47. Web ClipsAbove are not restrictions (with the exception of Web Clip removal)
  • 48.
  • 50. Implemented in Windows Server 2008 R2 as Network Device Enrollment Service (NDES)
  • 51.
  • 52. Policy for GPRS access point, username, and password. Policy for Proxy Server (but this is for GPRS access point only)
  • 53.
  • 54. Policy Mobile Device Management (MDM) Remote Configuration Pushing of configuration profiles to the device Remote Query Device, network, security, and application information Remote Management Remote wipe, remote lock, clear passcode, OTA application delivery
  • 55. Policy Mobile Device Management (MDM) API Level MDMS APIs announced with iOS 4.2 Very little public information, only available to MDM providers via separate agreement from Apple Products/Vendors AirWatch, Sybase Afaria, MobileIron Microsoft announced MDM support in SCCM 2012 http://www.zdnet.com/blog/microsoft/microsoft-readies-tool-for-managing-ipads-iphones-and-android-devices/8987 Beta 2 - http://www.microsoft.com/systemcenter/en/us/configuration-manager/cm-vnext-beta.aspx
  • 56. 2 3 4 5 1 Policy Data Network Application Bad Stuff Agenda What happens if I leave my device on the [bus|train|plane]?
  • 57. Data Hardware Based Encryption Anything written to (flash) storage encrypted with a 256-bit AES key Cannot be disabled by users Primarily designed for remote wipe (delete the key, and data is inaccessible) Savvy hacker can very easily get access to the data, even if pin-code protected Boot the device in recovery mode, SSH and various shell scripts to extract the data
  • 58. Data Data Protection (post iOS 4.2) Anything written to (flash) storage encrypted with a 256-bit AES key, derived from the user’s passcode Strength of data protection dependent on passcode strength Brute force with 4 digit simple PIN. A little more challenging when alphanumeric, including non-alpha characters Mitigated by PBKDF2 iterations (50ms derivation = ~20 passwords per second) However, only applies to applications that use Data Protection API
  • 59. Data Data Protection API When writing NSData object to file, include the NSDataWritingFileProtectionComplete attribute However, your application now needs to handle failure If application is running in background when the device is locked, you will not be able to access file
  • 60. Data Keychain The keychain is an encrypted container that holds passwords for multiple applications and secure services. (Apple Keychain services programming guide) Franhofer Institute Paper and Video “Lost Phone? Lost Passwords!” http://www.sit.fraunhofer.de/en/Images/sc_iPhone%20Passwords_tcm502-80443.pdf http://www.youtube.com/watch?v=uVGiNAs-QbY Accessed the keychain using techniques described in last section “Jailbroke” the device, booted into tethered Jailbreak mode, copied script to dump contents of Keychain Some passwords, not all, were revealed
  • 61. Data Keychain The Keychain supports several methods of encryption: kSecAttrAccessibleAlways – always accessible kSecAttrAccessibleWhenUnlocked - only accessible when device is unlocked kSecAttrAccessibleAfterFirstUnlock - accessible while locked. But if the device is restarted it must first be unlocked for data to be accessible again kSecAttrAccessibleWhenUnlockedThisDeviceOnly - only accessible when device is unlocked – device specific kSecAttrAccessibleAfterFirstUnlockThisDeviceOnly - accessible while locked. But if the device is restarted it must first be unlocked for data to be accessible again – device specific kSecAttrAccessibleAlwaysThisDeviceOnly – always accessible– device specific Resources http://labs.neohapsis.com/2011/02/28/researchers-steal-iphone-passwords-in-6-minutes-true-but-not-the-whole-story/
  • 62. Data Try to avoid – no protection Keychain The Keychain supports several methods of encryption: kSecAttrAccessibleAlways – always accessible kSecAttrAccessibleWhenUnlocked - only accessible when device is unlocked kSecAttrAccessibleAfterFirstUnlock - accessible while locked. But if the device is restarted it must first be unlocked for data to be accessible again kSecAttrAccessibleWhenUnlockedThisDeviceOnly - only accessible when device is unlocked – device specific kSecAttrAccessibleAfterFirstUnlockThisDeviceOnly - accessible while locked. But if the device is restarted it must first be unlocked for data to be accessible again – device specific kSecAttrAccessibleAlwaysThisDeviceOnly – always accessible– device specific Resources http://labs.neohapsis.com/2011/02/28/researchers-steal-iphone-passwords-in-6-minutes-true-but-not-the-whole-story/ Recommended for most apps Recommended for apps with background needs
  • 63. 2 3 4 5 1 Policy Data Network Application Bad Stuff Agenda How do I secure communication from the device?
  • 64. Network SSL/TLS SSL v3 / TLS v1 support for Web based applications Wireless Security Supported schemes WEP/WPA/WPA2 Enterprise Recommended: WPA2 Enterprise (128bit AES) 802.1x authentication protocols EAP-TLS, EAP-TTLS, EAP-FAST, EAP-SIM, PEAP v0, v1, LEAP
  • 65. Network VPN (Virtual Private Network) Support Supported Schemes Cisco IPSec, L2TP/IPSec, PPTP, SSL VPN Additional AppStore clients from Juniper, Cisco, and F5 Deployable via configuration profile VPN Proxy also configurable Support for Split IP Tunneling VPN on Demand (for cert-based authentication) Authentication Username/Password X.509 Certificate (Cisco IPSec only) Two Factor Authentication (RSA SecurID and CRYPTOCard) Resources http://developer.apple.com/library/ios/#featuredarticles/FA_VPN_Server_Configuration_for_iPhone_OS/Introduction/Introduction.html
  • 66. 2 3 4 5 1 Policy Data Network Application Bad Stuff Agenda I’m writing an application. How do I make my application secure?
  • 67. Application Authentication and Authorization Authentication No concept of users, accounts, passwords on the device Unlike Mac OS X, user is assumed to be authenticated (via pincode) No way of re-prompting user for pincode programmatically, nor locking the device Authentication for your own application will have to be custom (against back end services) Authorization No concept of roles, permissions on the device Unlike Mac OS X, user is assumed to be authorized (within the sandbox of the signed application) Resources http://developer.apple.com/library/mac/#documentation/Security/Conceptual/SecureCodingGuide/Articles/SecuritySvcs.html
  • 68. Application Accessing Secure Server-Side Resources Authentication NSURLConnection does not support NTLM auth Need to use CFNetwork or 3rd party, such as ASIHTTPRequest SSL support NSURLConnection supports SSL (prefix “https” on NSURL) Support for bypassing invalid certificates using continueWithoutCredentialForAuthenticationChallenge Support for client side certificate requests using didReceiveAuthenticationChallenge callback Resources http://stackoverflow.com/questions/933331/how-to-use-nsurlconnection-to-connect-with-ssl-for-an-untrusted-cert http://markmail.org/message/tnh2g6u5h42ive53 http://jameswilliams.me/developer/blog/2008/08/http-post-via-the-cfnetwork-stack/
  • 69. Application Password Storage Don’t store them in NSUserDefaults UI Abstracts the password, but can be easily accessed from the FileSystem/a simple backup/iPhone Explorer Use the Keychain instead (albeit referring to the previous section on Keychain) Resources http://software-security.sans.org/blog/2011/01/05/using-keychain-to-store-passwords-ios-iphone-ipad/
  • 70. Application Cryptography Support Asymmetric support through Certificate, Key, and Trust Services Manage certificates, public and private keys, trust policies Create, request certificate objects (CERs) Import certificates, keys, and identities Create public/private key pairs Represent trust policies SecKeyGeneratePair Example OSStatusSecKeyGeneratePair( CFDictionaryRefparameters, SecKeyRef*publicKey, SecKeyRef*privateKey ); Resources http://developer.apple.com/library/ios/#documentation/Security/Reference/certifkeytrustservices/Reference/reference.html#//apple_ref/doc/uid/TP30000157
  • 71. Application Cryptography Support Symmetric support through CommonCrypto Symmetric Encryption (Shared Key) From CommonCryptor.h CCCrypt(CCOperation op, CCAlgorithmalg, CCOptions options, constvoid *key, size_tkeyLength, constvoid *iv, constvoid *dataIn, size_tdataInLength, void *dataOut, size_tdataOutAvailable, size_t*dataOutMoved DES, 3DES, AES128 Digital Signatures (Digest Generation) From CommonDigest.h SHA1, SHA224, SHA256, SHA384, SHA512 CC_SHA256(constvoid *data, CC_LONG len, unsigned char *md) MD2, MD4, MD5 CC_MD5(constvoid *data, CC_LONG len, unsigned char *md) CCHmac (from CommonHMAC.h) CCHmac(kCCHmacAlgSHA256, [cKey bytes], [cKey length], [cData bytes], [cData length], buffer); Resources http://developer.apple.com/library/mac/#documentation/Darwin/Reference/ManPages/man3/CCCryptorFinal.3cc.html
  • 72. Application Cryptography Support Cryptographically secure random numbers SecRandomCopyBytes API returns cryptographically secure random number from accelerometer, compass, radio baseband Resources http://developer.apple.com/library/ios/#documentation/Security/Reference/RandomizationReference/Reference/reference.html
  • 73. 2 3 4 5 1 Policy Data Network Application Bad Stuff Agenda What other bad stuff should I be thinking about?
  • 74. Bad Stuff Jailbreaking What is Jailbreaking? Process of unlocking a device to gain full access (a.k.a. root access) to a device Allowing more control on the device by bypassing previous restrictions e.g. custom ringtones, wallpapers, software to capture network packets, VNC server for the device, etc. Constant battle between jailbreakers (iPhone Dev Team) and Apple releasing new software updates Is it Legal? In the US, under exemption to DMCA 2010, although it will void Apple’s device warranty. In other countries, best to check local laws. Is it the same as SIM unlocking? No. SIM unlocking is about using different SIMs from different operators.
  • 75. Bad Stuff Jailbreaking in the Enterprise Tethered vs. Untethered Jailbreaking Untethered = does not required USB cable and s/w to reboot device Most jailbreaks post 4.2.1 require tether Security Risks Frequent speculation on security for jailbroken devices Most originate to SSH/default password exploit iKee worm (changes wallpaper to Rick Astley background) Netherlands-based botnet-like worm uploading /etc/master.passwd file to a server in Lithuania
  • 76. Bad Stuff Plaintext in Configuration Profile Scenario Attacker grabs .mobileconfig from Email or public URL Investigates XML file for plaintext details (e.g. WLAN SSID and password) Mitigation Encrypting .mobileconfig files for device-specific deployments Placing .mobileconfig files behind authenticated pages (avoid Google filetype:mobileconfig Password)
  • 77. Bad Stuff Evil Configuration Profile Scenario Attacker generates evil .mobileconfig Signs using signature-only cert from one of the 224 root certs in the iPhone keystore SMS the .mobileconfig to a victim, fake them into installing it Mitigation Create a locked default profile to prevent this User education Apple’s removal of certain policy configuration options (e.g. proxy) Resources http://www.enterprisenetworkingplanet.com/netsecur/article.php/10952_3892776_1/Three-Steps-to-a-Cracked-iPhone.htm
  • 78. Bad Stuff Bypassing PIN code/Forensic Recovery of Disk Scenario Attacker has physical access to your device Even though locked with a PIN code, the device can still be placed in recovery code to override the PIN protection Mitigation Physical security of device Use of Data Protection API by applications installed on device (mail stores by default) Correct use of Key Chain algorithms to ensure passwords are not stored in clear Resources http://www.youtube.com/watch?v=5wS3AMbXRLs
  • 79. 2 3 4 5 1 Policy Data Network Application Bad Stuff Agenda
  • 81. Conclusion A lot to consider for iPhone and iPad Security Divide the problem in four ways Policy, data, network, and application …but also understand about the bad stuff! Your device is as secure as the weakest link Don’t rely on one mechanism (e.g. password policy) in lieu of the rest Think like a hacker What tools would they have? What would they try? What’s the worst that could happen if they got hold of your device?
  • 82. How Neudesic Can Help Application/Device Security Review Simulate losing one of your locked devices We run it through the tools that the hackers have You get a full report of our findings Mobile Strategy Review CxO Level Mobility Review Construct mobile landscape of your organization together with the applications, integration points, and security considerations that make sense You get a framework and roadmap for mobile adoption in your organization
  • 83. Thank You! Simon Guest Director, Mobility Solutions Neudesic, LLC simon.guest@neudesic.com