四款主流操作系统安全性横向评测.pdf
《四款主流操作系统安全性横向评测.pdf》由会员分享,可在线阅读,更多相关《四款主流操作系统安全性横向评测.pdf(18页珍藏版)》请在淘文阁 - 分享文档赚钱的网站上搜索。
1、Enterprise Readiness of Consumer Mobile PlatformsContentsExecutive Summary.3Mobile Roles and Postures.4Mobile Platforms Ratings.6BlackBerry OS.9Apple iOS.11Google Android.13Microsoft Windows Phone.15Appendix Security and Management Criteria.17ENTERPRISE READINESS OF CONSUMER MOBILE PLATFORMS I WHITE
2、 PAPERPage 2Executive SummaryAn increasing number of companies are opening corporate networks and data to consumer mobile technology.The resulting trend,usually referred as the consumerization of enterprise mobility,assumes even more disruptive connotations when the employees are allowed to use thei
3、r own smartphones and tablets to workcommonly referred as BYOD or Bring Your Own Device.Consumer technology is convenient,easy to learn,and fun to use.However,consumer technology is generally not as secure and manageable as required by the enterprise.Consumer technology brings real business value in
4、 terms of productivity and business agility.However,the lack of a strategic approach to the consumerization of IT creates security risks,financial exposure,and a management nightmare.Rather than resist it,organizations should embrace consumerization to unlock its business potential.This requires a s
5、trategic approach,flexible policies,and appropriate security and management tools.A strategic approach to consumerization starts with a clear understanding of the security and management capabilities of each mobile platform.While no mobile platform is immune from security vulnerabilities and managem
6、ent limitations,some platforms are more mature than others with regard to supporting the most appropriate set of policies required by the different mobile roles within the organization.This independent study offers an impartial and objective evaluation of todays four leading mobile operating systems
7、:BlackBerry OS,Apple iOS,Windows Phone,and Android.In addition,it offers a comprehensive framework of analysis including 60 security and management criteria organized in 12 categories and a corollary guide for defining mobile roles and postures.This document is not intended to forecast adoption or m
8、arket fate of individual platforms,because these are irrelevant to the IT managers who will likely have to consider some level of support for all of them anyway.Instead,the analytical framework and the experts ratings are intended to provide a valuable tool for the definition of sound mobile policie
9、s.This allows IT managers to embrace consumerization with confidence and to turn it into a competitive advantage for their organizations.ENTERPRISE READINESS OF CONSUMER MOBILE PLATFORMS I WHITE PAPERPage 3Mobile Roles and PosturesThe role-based methodologyby which a devices management and data prot
10、ection are dictated by the role of its user or owneris a trend taking place in many organizations that are thinking of new ways to profile the risk of mobile devices and their users.Mobile device management tools have centered,to date,on device remediation.In many cases,the ability to lock or wipe a
11、 lost device,while important,does not do much to protect the data on the device or restrict the way in which the device can be used in terms of capture,storage,and transmission of information.Roles such as general knowledge worker,contractors,occasional users,and,to a certain extent,managers are oft
12、en exempt from the most stringent controls which require complex device authentication and encryption.That said,there are managerial roles that require ready access to highly sensitive information such as compensation/salary,details which,when stored on the mobile device of a manager,requires a more
13、 stringent set of controls.In the case of the contractor or occasional user,device risk profile may be heightened due to the sharing of devices among multiple,occasional users or the introduction to a personal or other organizations owned device in the case of a contractor.RoleDescriptionKey Executi
14、veDue to the high visibility of this user,they are susceptible to targeted attacks and planned device compromise.Of highest value may be email and contact data stored on the device for the launch of further spear-phishing attacks and blackmail efforts.ManagerHandling employee personnel data and subs
15、tantial amounts of product Intellectual Property,managers should be viewed in a similar light to compliance-centric workers.Compliance-subject WorkerWorking in operations areas such as HR and Finance,these users are regularly in possession of data subject to security controls dictated and enforced b
16、y various compliance requirements.General Knowledge WorkerDue to the nature of their work,general knowledge workers like to have access to basic PIM functionality on their devices.Field WorkerSimilar to general knowledge workers,field employees may store data on devices when they are out of cellular
17、 network range.These users may require additional security controls as a result.Contractor/Occasional UserContractors and other trusted non-employees have access to company data but are not subject to the same controls and policies due to their third-party status.While requiring data to perform thei
18、r jobs,these users present a management challenge.Table 1 Mobile Roles DefinitionENTERPRISE READINESS OF CONSUMER MOBILE PLATFORMS I WHITE PAPERPage 4It is also possible for a user to be a member of multiple groups.For example,many key executives also function in a manager role and many managersor e
19、ven general knowledge workers,because of their industrymay be compliance-subject,in the cases of multiple group membership,an employees device security posture should default to the most stringent level of controls.The table below is intended to serve as a catalyst towardand not a substitute forpoli
20、cy generation.Detailed profiles of the various user groups inside of any organization will likely bear resemblance to many of the groups outlined here but also differ in many ways and require more granular,less binary policy decisions.The granularity in decisions around device policy should also be
21、driven by any relevant compliance standards that are likely to be far more prescriptive(with associated penalties for lack of compliance to the letter of the specification)in their demands.RoleKey ExecutiveManagerCompliance-subject WorkerGeneral Knowledge WorkerField WorkerContactor/Occasional UserP
22、olicy CoverageRequiredNice-to-haveNot RequiredDevice EncryptionMulti-factor AuthenticationLocal Storage AccessData Filtering(DLP)Complex PasswordsAttachment AccessNon-cellular Radio UseConnection EncryptionTable 2 Mobile Roles and PosturesENTERPRISE READINESS OF CONSUMER MOBILE PLATFORMS I WHITE PAP
23、ERPage 5Mobile Platforms RatingsThe analysis of the mobile security experts reveals that todays mobile platforms widely differ in terms of security and manageability capabilities.As a group,modern mobile platforms provide substantially better security than traditional desktop operating systems when
24、it comes to built-in security mechanisms,authentication,and data protection;even though they are vulnerable to attacks that dont affect desktop PCs.Application security,device management,and corporate email support are somehow sufficient although they still have room for improvement.The feature sets
25、 that IT managers should give high consideration to include:security certifications,device firewall,and support for virtualization,which are largely still missing.ENTERPRISE READINESS OF CONSUMER MOBILE PLATFORMS I WHITE PAPERPage 6Figure 1 Ratings by Category14.0012.0010.008.006.004.002.000.00Andro
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 主流 操作系统 安全性 横向 评测
限制150内