BYOD and the mobile security maturity model

2012-12-03

Jeff Debrosse

Western Governors University, USA
Editor: Helen Martin

Abstract

‘The BYOD concept needs a maturity model to ensure there is a clear path to increased organizational security’ Jeff Debrosse, Western Governors University


One of the latest terms to find its way into public and private organizations is ‘BYOD’ (Bring Your Own Device). While the practice of allowing employees to use their own mobile devices to access corporate networks and resources is typically considered to be cost effective and accommodates the users’ desire to use their own devices, the concept needs a maturity model to ensure there is a clear path to increased organizational security while maintaining (or increasing) cost-effectiveness.

While this article could propose a mobile security maturity model (MSMM), addressing the many permutations of organizations, needs and policies is beyond the scope of such a short piece. Instead, this article aims to act as a catalyst for organizations to think about BYOD implementations – or perhaps to think differently about them.

In the world of business and software product development, I’ve come to embrace the concept of the ‘Agile’ software development process. Through cycles known as iterations, products are progressively completed in planned and measurable phases (versions). At a certain point each version is considered production-ready. In other words, a pre-determined level of functionality and usability has been met. This process allows the developer to quickly deliver alpha, beta and subsequent releases to customers.

Applying these concepts to the mobile security maturity model allows for four areas of focus to help ensure the organization is tracking toward its BYOD goal:

  1. Agile. Threats are evolving and infection vectors change continually. The maturity model must be evaluated regularly to ensure that it addresses the dynamic landscape of threats. The model and the organization must be structured in such a way that makes it easy to pivot and realign to the threats when the difference between the maturity model and the threatscape becomes significant enough to warrant a change.

  2. Continuous improvement. When moving forward in the maturity model, each progression, regardless of size, should represent increased security and cost-effectiveness. Setting these two goals to pre-set, quantifiable values can help to meet an overall efficiency goal.

  3. Time-constrained. In order to gain the maximum effectiveness of the MSMM, the time it takes to make the transition between levels should be as short as reasonably possible, otherwise scope creep and organizational malaise may set in and destroy, or at least marginalize a very important process. The key is to truly understand the time required to make the transition to each level.

  4. Measured output. By tracking quantifiable targets (e.g. costs, number of devices, time taken to implement, etc.), it is possible to determine the organization’s overall velocity on MSMM implementations and on subsequent iterations through the model’s steps. This also increases the accuracy of forecasting and the ability to set realistic and attainable goals. Ultimately, the organization will be able to forecast long-term goals, set stakeholder expectations and determine the business value accordingly.

As companies strive to determine the best model, framework, or home-grown process for BYOD implementations, at a minimum, they will have to determine goals, stakeholders, domains and processes from the outset.

Regardless of whether companies choose to implement a mobile security maturity model, the BYOD trend is continuing to gain momentum – and is here to stay.

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest articles:

Nexus Android banking botnet – compromising C&C panels and dissecting mobile AppInjects

Aditya Sood & Rohit Bansal provide details of a security vulnerability in the Nexus Android botnet C&C panel that was exploited to compromise the C&C panel in order to gather threat intelligence, and present a model of mobile AppInjects.

Cryptojacking on the fly: TeamTNT using NVIDIA drivers to mine cryptocurrency

TeamTNT is known for attacking insecure and vulnerable Kubernetes deployments in order to infiltrate organizations’ dedicated environments and transform them into attack launchpads. In this article Aditya Sood presents a new module introduced by…

Collector-stealer: a Russian origin credential and information extractor

Collector-stealer, a piece of malware of Russian origin, is heavily used on the Internet to exfiltrate sensitive data from end-user systems and store it in its C&C panels. In this article, researchers Aditya K Sood and Rohit Chaturvedi present a 360…

Fighting Fire with Fire

In 1989, Joe Wells encountered his first virus: Jerusalem. He disassembled the virus, and from that moment onward, was intrigued by the properties of these small pieces of self-replicating code. Joe Wells was an expert on computer viruses, was partly…

Run your malicious VBA macros anywhere!

Kurt Natvig wanted to understand whether it’s possible to recompile VBA macros to another language, which could then easily be ‘run’ on any gateway, thus revealing a sample’s true nature in a safe manner. In this article he explains how he recompiled…


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.