SlideShare une entreprise Scribd logo
1  sur  29
Télécharger pour lire hors ligne
Auditing moving targets: 
Smartphones & tablets in government
– or –
John Bullock, BSc, CISSP, CISA, CRISC, GICSP
Senior IT Audit Specialist
Office of the Auditor General of BC
jbullock@bcauditor.com / www.linkedin.com/in/jb00seven
a CISO‐turned‐auditor's
take on mobile devices
2/29 PNIAF 2017‐03‐17
• mobile device audit gotchas
• cybersecurity & privacy insights specific to mobile
• perspective of both security practitioner & auditor
• mobile device enthusiast
• audit enthusiast
what's in it for me
what's in it for you
everything!
We use them for …
why mobile devices?
3/29 PNIAF 2017‐03‐17
watch, alarm clock, personal planner, social calendar, …
organizers
diary, camera, video camera, audio recorder, …
life recorders
calculator, GPS navigation, compass, address book,
dictionary, barcode scanner…
productivity
music player, game console, radio, TV, remote control, …
entertainment
books, comics, recipes, magazines, newspapers, …
reading
flashlight, measuring tape, level, magnifier, telescope, …
tools
from 99 things replaced by smartphones
4/29 PNIAF 2017‐03‐17
And it’s always increasing
5/29 PNIAF 2017‐03‐17
↑ functionality = ↑ risk
why an audit?
6/29 PNIAF 2017‐03‐17
risk factors: size
• small size → high number of devices lost or stolen
"One in 10 smartphone users have 
had their phones stolen"
http://www.wired.com/2014/12/wher
e‐stolen‐smart‐phones‐go/
For lost‐but‐returned devices, more 
than 90% of the good Samaritans 
snooped before returning them
http://www.informationweek.com/m
obile/lose‐your‐smartphone‐finders‐
will‐snoop‐through‐it/d/d‐id/1103354
7/29 PNIAF 2017‐03‐17
where thefts occur
loss & theft
• 2.1m stolen
• 3.1m lost
(stats taken from a 2015 US report)
8/29 PNIAF 2017‐03‐17
• tendency to use simple passwords due to the lack of a 
physical keyboard (or a very small keyboard)
risk factors: keyboards/passwords
9/29 PNIAF 2017‐03‐17
• frequent model changes mean devices quickly become 
unsupported (can't get security updates)
risk factors: lack of support
10/29 PNIAF 2017‐03‐17
• evolving operating systems provide opportunities for 
malware (malicious software)
risk factors: malware
New mobile malware tripled in 2015. 
Growth continued in 2016 with 
Ransomware (which blocks access 
until a user pays a sum of money) as 
the latest flavour.
https://www.scmagazineuk.com/kasp
ersky‐finds‐significant‐growth‐of‐
mobile‐malware‐in‐
2015/article/531116/
11/29 PNIAF 2017‐03‐17
how to start the audit?
12/29 PNIAF 2017‐03‐17
names/words matter
• flash drive?
• laptop?
• tablet?
Name of audit: MDM or MMD?
• Mobile Device Management is a product
What is a mobile device?
• Management of Mobile Devices 
• allowed for Policies, Procedures, Standards, 
Guidelines, and Practices.
• dumb (i.e. feature) phone, cell phone, smartphone?
14/29 PNIAF 2017‐03‐17
What's 
in scope?
What's 
out of 
scope?
scoping
• small input area (strong passwords more difficult)
• dramatically higher loss/theft risk
• immature security measures for OS/device
Think: What's different?
The big question:  laptop/tablet/smartphone
• not laptops (we know how to easily secure them, even 
if we don't)
• not flash drives, not even Chromebooks
16/29 PNIAF 2017‐03‐17
smartphones & tablets with mobile specific OS 
scoping
Yes?
• May need to examine personal devices. Talk to a lawyer.
• Whew. Examine controls to prevent, detect and 
remediate existence of BYOD devices. 
Depends on whether official BYOD program or not
The awkward question:  BYOD
No?
17/29 PNIAF 2017‐03‐17
scoping
• location information (current/past GPS coordinates, and 
Wi‐Fi and Bluetooth connection histories
The following are largely personal privacy issues:
The easy question:  privacy
• resources constrained
• coordinated audit w/ Privacy Commissioner investigation! 
• photographs
• app behaviour (Best Flashlight & contacts)
• performance data (telemetry)
• voice commands
18/29 PNIAF 2017‐03‐17
we scoped it out 
scoping
• phishing
• mobile banking
Solution? Think, is it different on mobile?
• largely "NO"
• but be prepared to justify your decisions again & again
Other questions:
19/29 PNIAF 2017‐03‐17
lines of enquiry
1. strategic planning activities
2. full lifecycle management of devices
3. security controls
4. monitoring, logging, incident management
20/29 PNIAF 2017‐03‐17
No audit plan
survives
contact with
the auditee.
~ Helmuth von Moltke, with 
apologies 
21/29 PNIAF 2017‐03‐17
risk gotchas
• "Why does X matter? We/they can do remote wipe.
• "It's unreasonable for us/them to have to type a passcode 
several times a day."
• infatuated with technology 
• mobile devices are the Most Personal Computers. Ever!
Cause:
• "Doesn't the fact that a smartphone is a tracking device
cause security issues?"
• confusing privacy and security / seeing only risk, not 
benefits
22/29 PNIAF 2017‐03‐17
inventory gotcha
23/29 PNIAF 2017‐03‐17
Devices 
billed by 
carrier
Devices
on MDM
unknown 
devices
•unofficial channels 
used to purchase
•some BYOD
•feature phones
•some 
smartphones w/o 
security settings
•jail‐broken/rooted
•BYOD
•deliberately 
unmanaged?
well
managed
Special considerations
24/29 PNIAF 2017‐03‐17
Top 15 tips guide
• we published a Mobile Devices: Tips for Security & Privacy 
document and released it the same day as our report
• a collaboration with the Officer of the Information and 
Privacy Commissioner's office (OIPC).
• designed to be used by everyone – work or personal, BC 
or anywhere else
• 10 security‐related tips, 5 privacy‐related; all in (correct) 
priority order 
25/29 PNIAF 2017‐03‐17
1. Password protect your device
2. Lock your screen
3. Encrypt it
4. Limit password attempts
5. Use anti‐malware software
6. Don't jailbreak or root your
device
7. Be choosy with apps
8. Limit app permissions
9. Keep software up‐to‐date
10. Limit location information
11. Review voice commands
12. Promptly report lost/stolen
devices
13. Bluetooth, Wi‐Fi, NFC
14. Safely dispose of your device
15. Consider using Find My
Phone
26/29
Summary of 
Mobile Devices: 
Tips for Security 
& Privacy
marketing
Downloads
Report 560
Tips 248
Social media impressions*
LinkedIn
909 (lock your screen – #2)
Facebook
871 (password protect your device – #1)
Twitter
288 (use anti‐malware – #5)
* from "Tips" promotion 2017‐Jan
27/29 PNIAF 2017‐03‐17
Special considerations
conclusion
• we feel we provided value (to auditee and citizens)
• gov't responded promptly to some findings (best day
ever!)
• collaboration with the OIPC was win/win
28/29 PNIAF 2017‐03‐17
Special considerations
questions?
John Bullock, BSc, CISSP, CISA, CRISC, GICSP
Senior IT Audit Specialist
Office of the Auditor General of BC
jbullock@bcauditor.com
+1 250 419 6214
29/29 PNIAF 2017‐03‐17

Contenu connexe

Dernier

Dernier (20)

Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptxBT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
BT & Neo4j _ How Knowledge Graphs help BT deliver Digital Transformation.pptx
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 

En vedette

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

En vedette (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Smartphones & tablets in government — a CISO-turned-auditor's take on mobile devices