ABC Article Directory banner displaying blue butterfly logo. Click to go directly to the main Homepage

BYOD: New Guidance on a Big Issue

     Bring Your Own Device (BYOD) mobile devices are currently a big issue for CIOs and ICT Security Professionals, both in Government and in the private sector. The US National Institute of Standards and Technology (NIST) has just weighed in with some help in its June 2013 Special Publication, Guidelines for Managing the Security of Mobile Devices in the Enterprise.

Why is BYOD such a big issue? A recent Cisco partner network survey, BYOD Insights, gives some answers:

- 9 in 10 Americans use their smartphones for work

- 40% don't password protect their smartphones

- 51% of Americans connect to unsecured wireless networks on their smartphone

- 52% disable Bluetooth discoverable mode

Of course that survey was in the US. How would Australia compare? Probably worse, judging by an April 23, 2013 Haptic Generation report, How Australians Engage With Smartphones and Tablets, which notes that:

- There are 30.2 million mobile services in Australia

- More than half of Australians are forecast to have a tablet by 2016

- 12% of Australian web traffic is via mobile devices

- 43% use smartphone to find product reviews before making a purchase decision

- Australians are leading the world in smartphone adoption

- Australian mobile ad spending is forecast to rise by 65% this year

- Mobile ads are noticed by 87% of smartphone users

- 54% of Australians have already engaged with advertising on a mobile phone

Specific BYOD issues which have been discussed recently by industry gurus, include:

- The BYOD privacy problem: Employee suspicion and resentment of organisational BYOD policies which expose personal data to organisational scrutiny

- Loss or theft of BYOD devices

- What to do when BYOD staff leave or are laid off

- Mandatory BYOD, where the employment contract requires staff to buy a personal device and use it for work. A May 2013 CIO Magazine article. Mandatory BYOD Heading Your Way notes that "Half of employers will require employees to supply their own device for work purposes by 2017, says a Gartner survey of CIOs" and "Already, BYOD experts are anticipating a flood of employee lawsuits over privacy and overtime."

Industry articles and blogs have been suggesting ways of dealing with the BYOD issue. A good example is the InfoWorld blog The Squeaky Wheel by Brian Katz, who in a June 03, 2013 blog, The right way to manage BYOD, suggested that a tiered access approach to information assets is the key to effective mobile security Brian says that the real way to handle BYOD is to move to managed BYOD (MBYOD), which means "building a tiered system for access to your corporate ecosystem. You create your tiered system of access, then associate different devices with each level of access. The final piece is to publicize this system to everyone in the company."

How does that advice stack up against the NIST recommendations? In general, It aligns with the NIST guidance that

- Organizations should have a mobile device security policy

- Organizations should develop system threat models for mobile devices and the resources that are accessed through the mobile devices

- Organizations deploying mobile devices should consider the merits of each provided security service, determine which services are needed for their environment, and then design and acquire one or more solutions that collectively provide the necessary services

In Section 2.2, High-Level Threats and Vulnerabilities, the Guidelines list the major security concerns forthese technologies that would be included in most mobile device threat models. e.g:

Section 2.2.1, Lack of Physical Security Controls, notes that "when planning mobile device security policies and controls, organizations should assume that mobile devices will be acquired by malicious parties who will attempt to recover sensitive data either directly from the devices themselves or indirectly by using the devices to access the organization's remote resources.

The mitigation strategy for this is layered. One layer involves requiring authentication before gaining access to the mobile device or the organization's resources accessible through the device... A second mitigation layer involves protecting sensitive data... Finally, another layer of mitigation involves user training and awareness, to reduce the frequency of insecure physical security practices."

Section 3, Technologies for Mobile Device Management, gives an overview of the current state of centralized mobile device management technologies, focusing on the technologies' components, architectures, and capabilities.

Section 4, Security for the Enterprise Mobile Device Solution Life Cycle, explains how the concepts presented in the previous sections of the guide should be incorporated throughout the entire life cycle of enterprise mobile device solutions, involving everything from policy to operations.

The Appendices provide useful references to supporting NIST SP 800-53 Security Controls and Publications and to other Resources, including Mobile Device Security-Related Checklist Sites.

The NIST Publication notes that most organizations do not need all of the possible security services provided by mobile device solutions. Categories of services to be considered include the following:

- General policy: enforcing enterprise security policies on the mobile device, such as restricting access to hardware and software, managing wireless network interfaces, and automatically monitoring, detecting, and reporting when policy violations occur.

- Data communication and storage: supporting strongly encrypted data communications and data storage, wiping the device before reissuing it, and remotely wiping the device if it is lost or stolen and is at risk of having its data recovered by an untrusted party.

- User and device authentication: requiring device authentication and/or other authentication before accessing organization resources, resetting forgotten passwords remotely, automatically locking idle devices, and remotely locking devices suspected of being left unlocked in an unsecured location.

- Applications: restricting which app stores may be used and which applications may be installed, restricting the permissions assigned to each application, installing and updating applications, restricting the use of synchronization services, verifying digital signatures on applications, and distributing the organization's applications from a dedicated mobile application store.

Mind you, the above are only a few of the points from the Executive Summary of the NIST Guidelines. The Publication is intended for Chief Information Officers (CIOs), Chief Information Security Officers (CISOs), and security managers, engineers, administrators, and others who are responsible for planning, implementing, and maintaining the security of mobile devices. It assumes that readers have a basic understanding of mobile device technologies and enterprise security principles.

The NIST Guidelines apply to both organization-provided and BYOD mobile devices. (Laptops are out of the scope, as are mobile devices with minimal computing capability, such as basic cell phones.) The Guidelines recommend on selecting, implementing, and using centralized management technologies. They also explain the security concerns inherent in mobile device use and give recommendations for securing mobile devices throughout their life cycles.

So while the NIST Guidelines are a welcome addition to our Knowledge Base on BYOD and the security of mobile devices in general, they may be a bit "over the top" for the small to medium organisation or even for some Government Departments. In the next issue of the Newsletter we look at some specific examples of how the Australian government and private sector are handling the BYOD and security of mobile devices issues.

Copyright (c) 2013 Ted Smillie

Article Source:

Article written by QESP Chairman Ted Smillie. QESP is a specialist group of practitioners wishing to share their experiences and learn from others in the area of Software Quality, Software Process and Software Metrics. Amongst our members we have some of the best known experts in this field. If you would like to read similar articles please visit

Posted on 2013-10-08, By: *

* Click on the author's name to view their profile and articles!!!

Note: The content of this article solely conveys the opinion of its author.

Animated RSS Symbol for the ABC Article Directory rss category feed ... Get Every New Technology Article Delivered Instantly!

Facebook Comments

" data-width="470" data-num-posts="10">

Cartoon image of a figure holding a magnifying glass looking for articles in the ABC Article Directory

Still Searching? Last Chance to find what you're looking for with a Google Custom Search!

Custom Search

Or.... You can search this site using our Bing Custom Search!


Did You Like/Dislike This Article? Give It YOUR Rating!

Please Rate this Article

No Ratings Yet. Be The First To Rate This Article

/EDF Publishing. All rights reserved. Script Services by: Sustainable Website Design
Use of our free service is protected by our Privacy Policy and Terms of Service | Contact Us

User published content is licensed under a Creative Commons Attribution-No Derivative Works 3.0 Unported License
Increase your website traffic with

Valid CSS!


Powered by ABC Article Directory