Identity, the New Security Perimeter

Identity, the New Security Perimeter

Mobile users have access to more information, better communication than ever before

Identity, the New Security PerimeterIn the past few years, we have witnessed a dramatic increase in employee mobility. Whether traveling, working from home, in flex offices or a conference room at a home office, we expect information access to be immediate and communication via voice, chat, text or email to be always available. This mobility started the “Consumerization of IT” that has led to the growing adoption of the Bring Your Own Device or BYOD trend for mobile phones and tablets. This has increased productivity as mobile users have access to more information and better communication using the devices they are most comfortable with. As users have added business apps to access secure data within the workplace, the need to link and manage the appropriate identity has led to the emergence of another growing trend—Bring Your Own Identity or BYOI.

One Device, Multiple Identities

On a modern mobile device, the user will have a mixture of personal and work activities, making it essential to associate each activity with the appropriate digital identity. An email client and a secure browser for accessing corporate portals are among the apps that a typical employee will need to complete their job. The corporate IT department needs to ensure that the digital identity that enables access to these resources is securely linked to the correct person, as well as be sure they can disable that access when appropriate. Organizations now realize that users also need a place on the mobile device for personal apps and data that can function concurrently with their work activities.

If an enterprise terminates an employee by eliminating access to their mobile phone, an IT organization must erase all of the work apps and data without touching the former employee’s personal files.

A New Perimeter

This increased mobility also has contributed to the shift away from perimeterbased security. If users are no longer behind a firewall, the security perimeter needs to be redefined. One view is that identity is the new perimeter. The set of applications used with a work identity and the associated credentials on a mobile device define a perimeter that an employer needs to manage and secure.

This perimeter needs to be visible to the user. It has to be clear if an employee is sending a personal or professional email; security is as much about making it easy for the user to do the correct thing as it is about technical hardening. Since email may contain enterprise confidential information, apps will be secured with some kind of lock, a PIN or possibly a biometric check if the phone has the capability. Fingerprint scanners are already built into or will be featured as an add-on for some smartphones. Other biometric options, such iris scan or voice recognition, are being developed.

Once unlocked, the user can interact with data and applications using their work identity as though they are on a workstation inside the company.

Stronger Authentication, Less Hassle

While the security perimeter is being redefined, it is becoming increasingly apparent that user name/password are no longer an acceptable level of authentication. Fortunately, the mobile device presents a robust platform for two, or even three, factor authentications. Virtually every mobile device has one or more secure elements, such as the Universal Integrated Circuit Card (UICC), that can be used to securely store keys and perform cryptographic operations. This can be used to enhance the security of digital identities. The credentials are stored in the secure element, and critical elements of cryptography are performed inside it without exposing the keys.

How to Implement BYOI

Implementing BYOI requires three steps:

  1. Ensure that the mobile devices are manageable, either by selecting devices with management capabilities or by using third-party products.
  2. Implement a mobile identity and credential management solution.
  3. Select applications that leverage the credentials.

Some mobile devices are designed for remote management. For example, BlackBerry products were among the earliest adopted in the enterprise due to their strong IT management features. BYOD created the need for mobile device management (MDM) solutions that manage all of the phones carried by a corporation’s employees. MDM products include a server-side management console and links to the mobile devices. If the mobile devices do not have features, like application containers, the MDM vendor may include client-side code. While early MDM solutions took over the entire device, providing the features desired by IT managers, they created conflicts with personal data on the device.

Newer offerings have a variety of ways to connect the MDM console with the enterprise apps and data, while keeping personal data separate. Mobile application management (MAM) products also are available to handle the downloading and updating of apps under enterprise control. Often, this takes the form of a private app store.

Provisioning and managing identity for BYOI requires a link into the phone for provisioning and lifecycle management, and at the same time a connection to the appropriate directory, identity and credential management software in the enterprise. A number of existing identity and credential management products have been extended to provide over-the-air (OTA) provisioning and lifecycle management. A mobile identity solution must implement and manage the specific policies of the organization.

Many government and commercial organizations in the United States are following the FIPS-201 standard from the National Institute of Standards and Technology (NIST) for identity credentials. Initially implemented using smart cards for public-key infrastructure (PKI) secure badges, the FIPS-201 standard is in the process of being updated to embrace mobile device support using the concept of derived credentials. Whether strictly following the NIST standards for full compliance, or simply using them as a guide for best practice, it is a good idea to use distinct, derived credentials for each mobile device. One needs to anticipate that there will be more than one mobile device per user, perhaps a smartphone and a tablet, and that the devices will be replaced as they are lost, stolen, broken or simply updated with a newer model.

Finding applications that are credential-aware for secure operations can be a challenge. Most mobile operating systems do not have standardized interfaces for cryptographic credentials, so each application has to be selected for the specific purpose. Several specialists offer products today, and more solutions will be offered as the pressure to move away from static passwords continues to grow.

Looking to the Future

Modern smartphone and tablet operating systems have support for device, application and identity management. Looking forward, the industry can see that the functionality operating systems provide will become richer, offering enhanced features and better security.

Enhanced security features in the hardware will increase the security of mobile device use significantly and will add to the isolation between personal and professional identities. Several handsets already support the ARM Trusted Execution Environment, which provides hardware protection to prevent malware on the phone stealing secrets or interfering with the security of apps.

Investments are being made in operating systems to provide higher levels of support for credential management to support BYOI and to strengthen the security platform. In 2013, the BlackBerry 10 is adding support for dual personas with the “Balance” application, and SE Android is the platform for solutions like the Samsung “Knox” that also offer separate containers for personal and work applications.

While the focus this year is on managing two identities securely on one device, as the market matures there will be a trend to support additional identities, each with its own perimeter. A person might have a second job or want to use a suite of healthcare apps that link securely to their healthcare provider. In each of these cases, the device holder will want to enable a set of apps to use a strongly authenticated identity that is separate from others.

As user mobility continues to increase, devices become more powerful and BYOD becomes the norm—a critical piece in increasing productivity and maximizing value.

This article originally appeared in the May 2013 issue of Security Today.

Featured

  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

  • Report: Nearly 1 in 5 Healthcare Leaders Say Cyberattacks Have Impacted Patient Care

    Omega Systems, a provider of managed IT and security services, today released new research that reveals the growing impact of cybersecurity challenges on leading healthcare organizations and patient safety. According to the 2025 Healthcare IT Landscape Report, 19% of healthcare leaders say a cyberattack has already disrupted patient care, and more than half (52%) believe a fatal cyber-related incident is inevitable within the next five years. Read Now

  • AI Is Now the Leading Cybersecurity Concern for Security, IT Leaders

    Arctic Wolf recently published findings from its State of Cybersecurity: 2025 Trends Report, offering insights from a global survey of more than 1,200 senior IT and cybersecurity decision-makers across 15 countries. Conducted by Sapio Research, the report captures the realities, risks, and readiness strategies shaping the modern security landscape. Read Now

  • Analysis of AI Tools Shows 85 Percent Have Been Breached

    AI tools are becoming essential to modern work, but their fast, unmonitored adoption is creating a new kind of security risk. Recent surveys reveal a clear trend – employees are rapidly adopting consumer-facing AI tools without employer approval, IT oversight, or any clear security policies. According to Cybernews Business Digital Index, nearly 90% of analyzed AI tools have been exposed to data breaches, putting businesses at severe risk. Read Now

  • Software Vulnerabilities Surged 61 Percent in 2024, According to New Report

    Action1, a provider of autonomous endpoint management (AEM) solutions, today released its 2025 Software Vulnerability Ratings Report, revealing a 61% year-over-year surge in discovered software vulnerabilities and a 96% spike in exploited vulnerabilities throughout 2024, amid an increasingly aggressive threat landscape. Read Now

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”