Page 25 - Mobile Data Loss
P. 25

Mobile Security Countermeasures  19


            receive a quarantine command. Instead a local policy selectively wipes
            the container. This is particularly helpful in organizations that have
            many Wi-Fi-only mobile devices. In fact, the PCI Council added this to
            its Mobile Point-of-Sale (POS) “Mobile Payment Acceptance Security
                                     1
            Guidelines v1.1, July, 2014. ”
               Most recently in Windows 10, the operating system now performs a
            device health check to validate the integrity of the device during the
            bootup process. This can then be reported to the MDM or EMM and
            used to block access to corporate resources.

               Summary of Mobile OS Compromise Countermeasures:

            • PIN or Password enforcement
            • Encryption
            • Containerization of enterprise data
            • OS Compromise detections (Jailbreak and Root detections) and
              Quarantine
              • Online selective wipe
              • Offline selective wipe
            • Out-of-compliance device triggers the network gateway to block access


            MALWARE AND RISKY APPS
            Based on the plethora of threats I outlined in chapter “Understanding
            Mobile Data Loss Threats,” it’s important to detail an approach to
            deterring malware and risky app behaviors. Since we know that iOS is
            no longer immune to malware threats, a comprehensive mobile security
            strategy should address these threats across all of your mobile devices.

               Anti-virus alone has taken a backseat to more comprehensive mobile
            malware security products. The reason for this is that on a mobile device
            anti-virus is just another app, and therefore the sandboxing limits its abil-
            ity to remove a malicious app, limiting it to alert the user and rely on
            them to remove it. This is very different from the PC world where we’ve
            always relied on anti-virus to both identify the threat and remove it.

               Due to this shortcoming of anti-virus alone, a new group of
            products has emerged referred to as App Reputation and Mobile
            Threat Prevention. This is a broad exploding category of products

            1 https://www.pcisecuritystandards.org/security_standards/documents.php
   20   21   22   23   24   25   26   27   28   29   30