Device management: Enabling hardware-rooted mobile data security

Many mobile devices lack built-in, secure hardware roots of trust. Here are steps IT can take to enable this hardware-rooted mobile data security.

As more executives and business users access governance, risk and compliance applications and data from their mobile devices, the IT department is on the hunt for better ways to defend mobile GRC applications against hackers. At the same time, IT must meet mobile data security, encryption, storage and retention requirements stipulated by compliance regulations.

A policy engine should be implemented to allow the device owner to manage the different policy agreements required to establish access rules for multiple information owners.

The problem is that many mobile devices lack the full range of secure hardware Roots of Trust (RoT) that are built into laptops and desktops to protect boot firmware, isolate applications and protect storage, and in turn prevent hackers from modifying or accessing security-critical software and firmware components. In all BlackBerry devices, for example, hardware RoT are inherent -- any BlackBerry device trying to boot up or connect to the BlackBerry infrastructure must complete the self-verification process before the user is granted access. Counterfeit devices cannot connect to the BlackBerry infrastructure.

For mobile devices without RoT built in, the following four steps will allow IT to enable hardware-rooted security.

Step 1. Implement security capabilities

For the first step, implement three mobile data security capabilities as defined in NIST publication SP 800-164:

Device integrity, to guarantee hardware, firmware and software are not corrupted. Counterfeited devices will not connect, store data or run applications.

Isolation, to separate one application or one data set from another to prevent unintended interaction between applications and information.

Storage protection, to preserve the confidentiality and integrity of data on the device at rest, in use and upon access revocation.

Step 2. Verify security components

In order to provide security capabilities for bring your own device and company-issued devices, verify whether the mobile devices contain a set of security components. These include RoT, an application programming interface, or API, to expose the RoT to the platform and a policy engine.

More on mobile data security

The four essential rules to ensure effective mobile data management

Achieve defense in depth of mobile GRC apps using these three steps

Hardware RoT are preferred over software RoT due to their smaller attack surfaces and more reliable behavior. They are trusted to perform such security-critical functions as software verification, cryptographic key protection, device integrity and device authentication. They are expected to discourage or prevent hackers from accessing the firmware when a mobile device is powered on.

Mobile applications interface with services offered by the various information owners who will frequently utilize the security functions provided by the RoT. An information owner uses these functions to locally store cryptographic keys, authentication credentials and other sensitive data. It can be an application-specific provider, a digital product provider or an enterprise that allows access to these resources from mobile devices.  

A policy engine should be implemented to allow the device owner to manage different policy agreements. These agreements are required to establish access rules for multiple information owners.

Step 3. Verify Roots of Trusts categories

The next step is to verify RoT for mobile devices as specified by NIST guidelines:

  • Roots of trust for storage (RTS) to store and manage cryptographic keys.
  • Roots of trust for verification, or RTV, to verify digital signatures associated with software/firmware and create assertions based on the results.
  • Roots of trust for integrity (RTI) to manage device integrity assertions.
  • Roots of trust for reporting (RTR) to generate device integrity reports.
  • Roots of trust for measurement, or RTM, to provide trusted measurement functions to be used by assertions that are protected via the RTI and attested to with the RTR.

Any device that does not meet the criteria of five RoT categories does not meet the National Institute of Standards and Technology's mobile data security standards.

Step 4. Mitigate risks of exposure

The last step is to mitigate the risk of exposing encryption keys.

Roots of trust for storage contain two classes of keys: Data encryption keys (DEKs) and key encryption keys (KEKs). While RTS protects KEKs, DEKs will remain at risk for exposure because DEKs are often unwrapped for use outside the RoT. For example, bulk encryption and decryption operations are executed outside the RTS by the application processor on a mobile device.

One way of mitigating this risk of exposure is to implement security capabilities that isolate one application from another. This capability is discussed in the first step mentioned above.

About the author:
Judith M. Myerson is the former ADP Security Officer/Manager at a naval facility, where she led enterprise projects for its Materiel Management System. Currently a consultant and subject matter expert, she is the author of several books and numerous articles on cloud use, compliance regulations, mobile security, software engineering, systems engineering and risk management. She received a Master of Science degree in Engineering from the University of Pennsylvania and holds the Risk and Information System Control, or CRISC, certification.

Let us know what you think about the story; email Ben Cole, site editor. For more regulatory compliance news and updates throughout the week, follow us on Twitter @ITCompliance.

This was first published in March 2014

Dig deeper on Encryption software solutions

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

Related Discussions

Judith M. Myerson, Contributor asks:

What steps, if any, does your organization take to ensure hardware-rooted security for mobile business data generated and stored on mobile devices?

0  Responses So Far

Join the Discussion

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCIO

SearchHealthIT

SearchCloudComputing

SearchDataCenter

SearchDataManagement

SearchSecurity

Close