At Fluid Attacks
, in order to protect our clients data we administer our devices with a Mobile Device Management (MDM) tool.
This tool enables us to manage how our devices are being used and harden the devices' security by installing pre-configured profiles.
Each user account is associated with a device and the access to these is also monitored and controlled.
The profiles are set up with different configurations following our criteria.
Since we use different configuration profiles for our laptops for users and admins, said profiles are configured with different policies:
Authorization: How the devices can be accessed only by its intended users and how permissions over said device are managed. We comply with the following criteria:
Laptops' passwords and data are only visible by its user, the use of KeyChain is mandatory for all users for security purposes, also to protect passwords saved on the KeyChain it automatically gets locked when the computer is locked or suspended.
Only administrators have access to administration data, also admin users permissions are limited for their tasks, meaning there's no root users nor root accounts enabled.
Automatic login is disabled to prevent data leaks, password is required for any system configuration and to access data.
A minimum set of requirements must be followed for passwords: a minimum set of 16 characters including at least two non alphanumeric, not to have two consecutive nor three sequential characters, at least one number and one alphabetic, not to be the same as the previous 50 passwords.
Passwords have an age limit established, and a history of passwords is saved for future passwords checking.
Requirements: 300, 185, 375, 096, 033, 341, 095, 341, 257, 186, 229, 227, 380, 300, 310, 133, 130, 129, 141, 369.
Updates: Keep devices and Apps updated with its latest and secure versions.
Users: Control about how login is made on the device and local accounts are created improving the security:
The guest account allows users access to the system without having to create an account or password. Guest users are unable to make setting changes, cannot remotely login to the system and all created files, caches, and passwords are deleted upon logging out.
The login window prompts a user for his/her credentials, verifies their authorization level and then allows or denies the user access to the system.
The presence of the Guest home folder can cause automated audits to fail when looking for compliant settings within all User folders as well. Rather than ignoring the folders continued existence it is best removed.
Requirements: 142, 264, 265, 266, 319.
Networking: How we handle insecure protocols and services which can compromise the data stored on the devices:
Auditing: How we handle logs and monitor our devices for auditing purposes:
The audit system writes important operational and security information that can be both useful for an attacker and a place for an attacker to attempt to obfuscate unwanted changes that were recorded. As part of defense-in-depth the /etc/security/audit_control
configuration and the files in /var/audit should be owned only by root with group wheel with read only rights and no other access allowed. ACLs should not be used for these files.
The socketfilter firewall is what is used when the firewall is turned on in the Security PreferencePane. In order to appropriately monitor what access is allowed and denied logging must be enabled.
Requirements: 080, 377, 378, 079, 075.
Our collaboration systems also provide security requirements that mobile devices must comply with before enrolling in the organization's systems. This is especially useful as personal mobile devices are common targets for malicious hackers.
Some of the requirements are the following: