Apple’s iOS devices meet enterprise security needs

Apple’ Inc.’s iOS, in the newer iPhones and the iPad, is now secure enough for many enterprise to deploy, according to a report from Forrester Research Inc. But even the most recent version of iOS, in the iPhone 4, falls well short of the high security offered by Research in Motion Inc.’s BlackBerry platform.
Cupterino, Calif.-based Apple released the second beta of IOS 4 last week.
Forrester recommends implementing a basic set of iOS-based security features on both company- and employee-owned iPhones, and then layering on additional capabilities and policies to meet more stringent enterprise requirements. But the Apple devices still lack a range of features that high-security organizations may need.
More from Computerworld Canada

Nearly one in three companies in North America and Europe currently support the iPhone, according to Forrester. That’s an unprecedented number given that Apple offers almost nothing in terms of the management and security infrastructure that are hallmarks of mobile operating systems from both RIM and Microsoft Corp.

But the changes Apple has introduced in iOS 3.1 and this summer in iOS 4 have been winning over IT executives. Today, iPhones and iPads now “satisfy the basic security needs of most enterprises,” writes Andrew Jaquith, senior analyst with  Cambridge, Mass.-based Forrester.

The Apple platform now implements seven key features that cover these basic requirements, he says:

* Encrypting e-mail to and from iOS devices; via Exchange ActiveSync licensed from Microsoft or SSL-enabled IMPA and SMTP over TLS.

* Remotely wiping data from lost or stolen devices, now able to be done in less than one second.

* Passcode lock, via numeric-only PIN, or via an alphanumeric password; both can be set to varying levels of strength.

* After a set period of inactivity, iOS can lock the device to prevent access to information if it’s left unattended.

* Devices can erase themselves automatically after a specified number of failed unlock attempts.

* Signed user configuration profiles, which set the security settings for a given user; the signed profile ensures it hasn’t been tampered with.

* Automatically refreshing security policy settings, but only via ActiveSync and Microsoft Exchange 2007; (IBM Corp.’s Lotus Notes Traveler eventually plans also to push updated policies to the device).

The minimum-length PIN, preventing guessable passwords and the autowipe feature combine to ensure that “cybercriminals cannot easily guess passwords without forcing the device to erase itself,” Jaquith writes. Autolock and remote wipe mean that it’s less likely company data can be gleaned from lost of stolen devices.

These basic features need to be complemented by an updated employee acceptable use policy, Forrester recommends. Among them:

* Employees must accept installation of the company’s security profiles on the device in order to access company networks and data.

* Notify IT at once if the device is lost or stolen, or the employee no longer needs company access.

* Codify the company’s right to wipe the device, even an employee-owned device, if it’s lost or stolen, or the employee leaves the company.

* Require users to back up their iOS device via iTunes.

* Reimbursement policies, if any, are clearly stated.

For companies that need higher level of security, IT can require stronger unlock passcodes, mandate the iOS hardware encryption feature be turned on, make use of certificated-based authentication for e-mail, virtual private network VPN or Wi-Fi access, via Simple Certificate Enrollment Protocol (supported by Apple) and a PKI and SCEP server; application encryption, via new APIs for this purpose in iOS 4 (Jaquith notes that the iPad won’t support iOS 4 until some time later in 2010).

Two other options to consider are: the company’s right to confiscated even an employee-owned iPhone or iPad in the event of an emergency (a standard practice in the U.S. Department of Defense, according to Forrester); and require nonpublic Personally Identifiable Information (PII) and Protected Health Information (PHI) to be removed from the employee’s device, a requirement of some federal and state laws.

For company-owned iOS devices, there are yet more restrictive security options, though, “Forrester regards these policy options as excessive for personally owned devices, and we recommend that you implement these policies only sparingly,” according to the report.

These additional steps include banning access to Apple’s App Store, or the installation of apps, or both; blocking use of the iPhone camera; turning off the iPhone and iPad screen-capture feature (activated by pressing and holding the Home key); and block use of the apps such as the YouTube app, or even the Safari Web browser.

There are still weak points in implementing security for iOS devices, according to Jaquith. Apple’s iPhone Configuration Utility, for example, generates the configuration profiles, but lags in automating various installation steps. This slack is being picked up now by third parties such as Sybase and Trust Digital, Jaquith says.

High-end device management tools are only now starting to become available, with new APIs in iOS 4. Several companies, including Sybase and MobileIron are working with the new APIs to eventually deliver centralized platforms for much more robust iOS device management.

Also missing are support for smart card authentication; compliance with FIPS 140-2 (the iPhone crypto software hasn’t yet been certified); end-to-end e-mail encryption; SMS logging and archiving; and the ability to segregate work and personal user environments, data and applications.


Would you recommend this article?


Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.

Jim Love, Chief Content Officer, IT World Canada

Featured Download

Featured Articles

ADaPT connects employers with highly skilled young workers

Help wanted. That’s what many tech companies across Canada are saying, and research shows...

Unlocking Transformation: IoT and Generative AI Powered by Cloud

Amidst economic fluctuations and disruptive forces, Canadian businesses are steering through uncharted waters. To...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now