Difference between revisions of "Mobile Security"

From MgmtWiki
Jump to: navigation, search
(Solutions)
(Solutions)
 
Line 15: Line 15:
 
** Trusted Boot Process - The LEX L11 checks the authenticity and integrity of the firmware during the device boot processes. If during this process the firmware fails integrity or authenticity checks, the firmware is prevented from being executed.  
 
** Trusted Boot Process - The LEX L11 checks the authenticity and integrity of the firmware during the device boot processes. If during this process the firmware fails integrity or authenticity checks, the firmware is prevented from being executed.  
 
** [https://www.motorolasolutions.com/content/dam/msi/docs/products/lte-user-devices/lex_l11_specification_sheet_eng.pdf LEX 11 specs]
 
** [https://www.motorolasolutions.com/content/dam/msi/docs/products/lte-user-devices/lex_l11_specification_sheet_eng.pdf LEX 11 specs]
** [https://www.niap-ccevs.org/MMO/Product/st_vid11229-aar.pdf Lex 11 Compliance document]
+
** [https://www.niap-ccevs.org/MMO/Product/st_vid11229-aar.pdf Lex 11 Compliance document] prepared for the National Information Assurance Partnership - Common Criteria Evaluation and Validation Scheme
 
* [https://www.samsungknox.com/en/secured-by-knox Knox Vault] is an EAL5+ certified, tamper-resistant environment that holds the data that matters most on your device. It physically isolates PINs, passwords, biometrics and security-critical keys away from the rest and stores them in the secure memory. This is only available on high-end devices.
 
* [https://www.samsungknox.com/en/secured-by-knox Knox Vault] is an EAL5+ certified, tamper-resistant environment that holds the data that matters most on your device. It physically isolates PINs, passwords, biometrics and security-critical keys away from the rest and stores them in the secure memory. This is only available on high-end devices.
 
** Auditing / Logging - Security and operational event logging is done by the operating system and applications to produce retrievable audit trails for troubleshooting, security monitoring and forensics.
 
** Auditing / Logging - Security and operational event logging is done by the operating system and applications to produce retrievable audit trails for troubleshooting, security monitoring and forensics.

Latest revision as of 16:43, 21 September 2022

Full Title or Meme

Mobile Security refers to mobile devices that contain secrets that should not be disclosed even if the mobile device is misplaced.

Context

The canonical Mobile Security devices are:

  1. a Smart Card with some internal key storage space.
  2. a smartphone with an ARM processor that contains a Secure Enclave.

Solutions

  • Many mobile management solutions like Microsoft or Samsung Knox.
  • Android Enterprise Recommended knowledge worker and rugged devices. 174 devices that meet Android 12 requirements.
  • The Motorola Solutions LEX11 and related devices.
    • LEX L11 KEY FEATURES The LEX L11 is certified to U.S. National Security Agency (NSA) Commercial Solutions for Classified (CSfC) Program standards for accessing sensitive information across national security systems up to and including the top-secret level.
    • The LEX L11 is certified to Security Technical Implementation Guide (STIG) provided by the Defense Information Systems Agency (DISA) as part of the Department of Defense (DoD). This means that the LEX L11 complies with the technical testing and hardening frameworks that contain technical guidelines for the standardization of security protocols in order to enhance overall security and reduce vulnerabilities.
    • Trusted Boot Process - The LEX L11 checks the authenticity and integrity of the firmware during the device boot processes. If during this process the firmware fails integrity or authenticity checks, the firmware is prevented from being executed.
    • LEX 11 specs
    • Lex 11 Compliance document prepared for the National Information Assurance Partnership - Common Criteria Evaluation and Validation Scheme
  • Knox Vault is an EAL5+ certified, tamper-resistant environment that holds the data that matters most on your device. It physically isolates PINs, passwords, biometrics and security-critical keys away from the rest and stores them in the secure memory. This is only available on high-end devices.
    • Auditing / Logging - Security and operational event logging is done by the operating system and applications to produce retrievable audit trails for troubleshooting, security monitoring and forensics.
    • Knox Vault on devices with Samsung Exynos processors is EAL5+ certified.
    • Knox Vault on devices with Qualcomm processors is EAL4+ certified.
    • In the case of a device hijacking, the self-destruct sequence is initiated without user consent or additional backup of the security data stored in Knox Vault.

References