Difference between revisions of "Mobile Security"

From MgmtWiki
Jump to: navigation, search
(Solutions)
(Solutions)
Line 10: Line 10:
 
* Many mobile management solutions like Microsoft or Samsung Knox.
 
* Many mobile management solutions like Microsoft or Samsung Knox.
 
* [https://www.militaryexpos.com/wp-content/uploads/2021/10/Secure-Mobile-Environment-Brochure.pdf The Motorola Solutions LEX11 and related devices].
 
* [https://www.militaryexpos.com/wp-content/uploads/2021/10/Secure-Mobile-Environment-Brochure.pdf The Motorola Solutions LEX11 and related devices].
** [https://www.motorolasolutions.com/content/dam/msi/docs/products/lte-user-devices/lex_l11_key_features_catalog_-_north_america_-_feb_2021.pdf LEX L11 KEY FEATURES]
+
** [https://www.motorolasolutions.com/content/dam/msi/docs/products/lte-user-devices/lex_l11_key_features_catalog_-_north_america_-_feb_2021.pdf LEX L11 KEY FEATURES] The LEX L11 is certified to U.S. National Security Agency (NSA) Commercial Solutions for Classified (CSfC) Program standards for accessing sensitive information across national security systems up to and including the top-secret level.
 +
**The LEX L11 is certified to Security Technical Implementation Guide (STIG) provided by the Defense
 +
Information Systems Agency (DISA) as part of the Department of Defense (DoD). This means that the LEX L11
 +
complies with the technical testing and hardening frameworks that contain technical guidelines for the standardization of security protocols in order to enhance overall security and reduce vulnerabilities
 
* [https://www.samsungknox.com/en/secured-by-knox Knox Vault] is an EAL5+ certified, tamper-resistant environment that holds the data that matters most on your device. It physically isolates PINs, passwords, biometrics and security-critical keys away from the rest and stores them in the secure memory. This is only available on high-end devices.
 
* [https://www.samsungknox.com/en/secured-by-knox Knox Vault] is an EAL5+ certified, tamper-resistant environment that holds the data that matters most on your device. It physically isolates PINs, passwords, biometrics and security-critical keys away from the rest and stores them in the secure memory. This is only available on high-end devices.
 
** Knox Vault on devices with Samsung Exynos processors is EAL5+ certified.
 
** Knox Vault on devices with Samsung Exynos processors is EAL5+ certified.

Revision as of 15:17, 21 September 2022

Full Title or Meme

Mobile Security refers to mobile devices that contain secrets that should not be disclosed even if the mobile device is misplaced.

Context

The canonical Mobile Security devices are:

  1. a Smart Card with some internal key storage space.
  2. a smartphone with an ARM processor that contains a Secure Enclave.

Solutions

  • Many mobile management solutions like Microsoft or Samsung Knox.
  • The Motorola Solutions LEX11 and related devices.
    • LEX L11 KEY FEATURES The LEX L11 is certified to U.S. National Security Agency (NSA) Commercial Solutions for Classified (CSfC) Program standards for accessing sensitive information across national security systems up to and including the top-secret level.
    • The LEX L11 is certified to Security Technical Implementation Guide (STIG) provided by the Defense

Information Systems Agency (DISA) as part of the Department of Defense (DoD). This means that the LEX L11 complies with the technical testing and hardening frameworks that contain technical guidelines for the standardization of security protocols in order to enhance overall security and reduce vulnerabilities

  • Knox Vault is an EAL5+ certified, tamper-resistant environment that holds the data that matters most on your device. It physically isolates PINs, passwords, biometrics and security-critical keys away from the rest and stores them in the secure memory. This is only available on high-end devices.
    • Knox Vault on devices with Samsung Exynos processors is EAL5+ certified.
    • Knox Vault on devices with Qualcomm processors is EAL4+ certified.
    • In the case of a device hijacking, the self-destruct sequence is initiated without user consent or additional backup of the security data stored in Knox Vault.

References