SlideShare a Scribd company logo
1 of 23
Download to read offline
Getting Into Mobile 
Without Getting Into Trouble 
Greg Kliewer 
Senior Solutions Strategist 
October, 2014
2 
© 2014 CA. ALL RIGHTS RESERVED. 
The good old days 
Network separation 
No programmatic access from the Public Internet 
Safety through total isolation and control
3 
© 2014 CA. ALL RIGHTS RESERVED. 
56% 
Canadian smartphone ownership in 2013. Up from 33% 
in 2012 1 
2013 
Time spent on non- voice mobile surpasses time spent on workstations 3 
2014 Smartphone and tablet sales surpass workstations 4 
2 http://www.forbes.com/sites/benedictevans/2012/12/31/the-end-of-the-beginning-mobile-blows-past-pcs-so-what 
2012 
Mobile devices outnumber workstations by 2:1 2 
3 http://www.emarketer.com/Article.aspx?R=1010095 
4 http://www.gartner.com/newsroom/id/2610015 
1 http://www.cbc.ca/news/business/smartphone-use-way-up-in-canada-google-finds-1.1384916
4 
© 2014 CA. ALL RIGHTS RESERVED. 
Today
5 
© 2014 CA. ALL RIGHTS RESERVED. 
Threats 
Inauthentic user 
Careless user 
Poorly coded apps 
Spoofed apps 
Lost or stolen devices 
Hijacked or tampered with devices
What are you going to do about it? building blocks for secure mobile access
7 
© 2014 CA. ALL RIGHTS RESERVED. 
Reverse proxy in the DMZ using a hardened platform 
•Terminate inbound connection 
•Establish a new connection to fulfill the request 
•The only open port to the public Internet should be 443 
•All extraneous ports should be closed 
•All services not strictly necessary should be stopped or removed, preferably 
•Management ports are on separate network not accessible from the public Internet 
•Be ready to patch at a moment’s notice (e.g. heartbleed, bash shellshock)
8 
© 2014 CA. ALL RIGHTS RESERVED. 
Validate user credentials before making the backend connection 
•Extract credentials 
•Validate them against the existing user directory 
•THEN make the backend connection
9 
© 2014 CA. ALL RIGHTS RESERVED. 
PROBLEM It’s the app that calls the API. Do you want it holding on to the user’s username and password?
10 
© 2014 CA. ALL RIGHTS RESERVED. 
Introduce an OAuth 2.0 Authorization Server … 
•Authenticate User 
•Authenticate App (request user to grant access to the App) 
•Issue an Access Token that represents an ephemeral session with the client 
•App Creds 
•Token Sessions with permissions 
•NOTE the requirement for a new set of credentials, identifying the app
11 
© 2014 CA. ALL RIGHTS RESERVED. 
…and an OAuth 2.0 Resource Server 
•Validate Access Token 
•Retrieve permissions 
•Authorize access to requested resources 
•Rinse and repeat 
•App Creds 
•Token Sessions with permissions 
•The session eliminates the need for an app to cache or store the user credentials 
•Instead, you keep a temporary-use token for a short period of time
12 
© 2014 CA. ALL RIGHTS RESERVED. 
PROBLEM Sessions can be hijacked.
13 
© 2014 CA. ALL RIGHTS RESERVED. 
SOLUTION This one, at least, has a fairly simple solution.
14 
© 2014 CA. ALL RIGHTS RESERVED. 
Keep the Access Token private 
•443 ONLY 
•Strong crypto only 
•App Creds 
•Token Sessions with permissions 
•The Access Token is a secret and must be treated as such. 
•Use HTTP keep alives to limit resource utilization impact. 
•You may want SSL acceleration for this. 
•Did we mention? Be ready to patch / step up key strength / cipher suite requirements at any time 
SSL / TLS
15 
© 2014 CA. ALL RIGHTS RESERVED. 
PROBLEM Aren’t mobile devices and apps just inherently unsecure?
16 
© 2014 CA. ALL RIGHTS RESERVED. 
•Relaxes device security (no screen lock) (no PIN / passphrase) 
•Leaves device behind at the gym or on the bus 
•Tricks user into downloading fake app 
•Steals phone, bypasses protections, unlocks it 
•Caches or persists user ID credentials 
•Stores sensitive data 
•Stores sensitive data without safeguards
17 
© 2014 CA. ALL RIGHTS RESERVED. 
Mobile Device Management 
Mobile Application Management 
•Relaxes device security (no screen lock) (no PIN / passphrase) 
•Leaves device behind at the gym or on the bus 
•Tricks user into downloading fake app 
•Steals phone, bypasses protections, unlocks it 
•Caches or persists user ID credentials 
•Stores sensitive data 
•Stores sensitive data without safeguards
18 
© 2014 CA. ALL RIGHTS RESERVED. 
SDKs can provide a lighter-weight solution 
•Takes security out of the hands of app devs (they will thank you!) 
•Tie in to device safeguards 
Key stores (hdw backed) 
Native Containers 
Biometrics 
Geolocation 
Remote control (for wipe) 
Manufacturer Attestation 
•Tie enhanced crypto to user authentication and consent 
Dynamic app secret provisioning 
Dynamic certificate provisioning 
Gateway 
SDK
19 
© 2014 CA. ALL RIGHTS RESERVED. 
Solutions for secure enterprise mobility
20 
© 2014 CA. ALL RIGHTS RESERVED. 
1. Securely gate all access from mobile platforms 
Comprehensive Access Control 
MOBILE API 
GATEWAY 
Appliance 
Pre-hardened for exposure to public Internet 
Onboard OAuth 2.0 Authorization and Resource Servers 
Control sign on and sign off across apps, devices, and web properties 
Enforce multi-factor authentication (e.g. OTP, Biometrics, Attestation) 
Secure Platform 
MOBILE API GATEWAY
21 
© 2014 CA. ALL RIGHTS RESERVED. 
2. Extend your security reach onto the devices themselves 
PLATFORM 
SDKs 
Take security out of the hands of application developers 
Bind to device security primitives to leverage native capabilities (e.g. keystores, containers, hardware-backed crypto, biometrics, etc.) 
Block access from inauthentic applications 
Detect device and OS tampering 
MOBILE API GATEWAY 
SDK
22 
© 2014 CA. ALL RIGHTS RESERVED. 
“The most radical and transformative of inventions are often those that empower others to unleash their creativity – to pursue their dreams.” -Jeff Bezos 
Come see us at booth 603
Senior Solution Strategist 
Greg.Kliewer@ca.com 
@cainc 
slideshare.net/CAinc 
linkedin.com/company/ca-technologies 
ca.com 
Greg Kliewer

More Related Content

Viewers also liked

API Monetization: Unlock the Value of Your Data
API Monetization: Unlock the Value of Your DataAPI Monetization: Unlock the Value of Your Data
API Monetization: Unlock the Value of Your DataCA API Management
 
Api architectures for the modern enterprise
Api architectures for the modern enterpriseApi architectures for the modern enterprise
Api architectures for the modern enterpriseCA API Management
 
Takeaways from API Security Breaches Webinar
Takeaways from API Security Breaches WebinarTakeaways from API Security Breaches Webinar
Takeaways from API Security Breaches WebinarCA API Management
 
Your Journey to Agility using APIs - Tyson Whitten, Director of Solutions Mar...
Your Journey to Agility using APIs - Tyson Whitten, Director of Solutions Mar...Your Journey to Agility using APIs - Tyson Whitten, Director of Solutions Mar...
Your Journey to Agility using APIs - Tyson Whitten, Director of Solutions Mar...CA API Management
 
Self-Replication, Strandbeest, and the Game of Life What von Neumann, Jansen,...
Self-Replication, Strandbeest, and the Game of Life What von Neumann, Jansen,...Self-Replication, Strandbeest, and the Game of Life What von Neumann, Jansen,...
Self-Replication, Strandbeest, and the Game of Life What von Neumann, Jansen,...CA API Management
 
5 steps end to end security consumer apps
5 steps end to end security consumer apps5 steps end to end security consumer apps
5 steps end to end security consumer appsCA API Management
 
API Security & Federation Patterns - Francois Lascelles, Chief Architect, Lay...
API Security & Federation Patterns - Francois Lascelles, Chief Architect, Lay...API Security & Federation Patterns - Francois Lascelles, Chief Architect, Lay...
API Security & Federation Patterns - Francois Lascelles, Chief Architect, Lay...CA API Management
 
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...CA API Management
 
How to Choose A SOA Gateway from Layer 7
How to Choose A SOA Gateway from Layer 7How to Choose A SOA Gateway from Layer 7
How to Choose A SOA Gateway from Layer 7CA API Management
 
The New Governance - Scott Morrison CTO Layer 7 Technologies
The New Governance - Scott Morrison CTO Layer 7 TechnologiesThe New Governance - Scott Morrison CTO Layer 7 Technologies
The New Governance - Scott Morrison CTO Layer 7 TechnologiesCA API Management
 
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...CA API Management
 
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...CA API Management
 
Mastering Digital Channels with APIs
Mastering Digital Channels with APIsMastering Digital Channels with APIs
Mastering Digital Channels with APIsCA API Management
 
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...CA API Management
 
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...CA API Management
 

Viewers also liked (17)

API Monetization: Unlock the Value of Your Data
API Monetization: Unlock the Value of Your DataAPI Monetization: Unlock the Value of Your Data
API Monetization: Unlock the Value of Your Data
 
Api architectures for the modern enterprise
Api architectures for the modern enterpriseApi architectures for the modern enterprise
Api architectures for the modern enterprise
 
Takeaways from API Security Breaches Webinar
Takeaways from API Security Breaches WebinarTakeaways from API Security Breaches Webinar
Takeaways from API Security Breaches Webinar
 
Your Journey to Agility using APIs - Tyson Whitten, Director of Solutions Mar...
Your Journey to Agility using APIs - Tyson Whitten, Director of Solutions Mar...Your Journey to Agility using APIs - Tyson Whitten, Director of Solutions Mar...
Your Journey to Agility using APIs - Tyson Whitten, Director of Solutions Mar...
 
Self-Replication, Strandbeest, and the Game of Life What von Neumann, Jansen,...
Self-Replication, Strandbeest, and the Game of Life What von Neumann, Jansen,...Self-Replication, Strandbeest, and the Game of Life What von Neumann, Jansen,...
Self-Replication, Strandbeest, and the Game of Life What von Neumann, Jansen,...
 
5 steps end to end security consumer apps
5 steps end to end security consumer apps5 steps end to end security consumer apps
5 steps end to end security consumer apps
 
API Security & Federation Patterns - Francois Lascelles, Chief Architect, Lay...
API Security & Federation Patterns - Francois Lascelles, Chief Architect, Lay...API Security & Federation Patterns - Francois Lascelles, Chief Architect, Lay...
API Security & Federation Patterns - Francois Lascelles, Chief Architect, Lay...
 
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
 
Layer 7 and Oracle -
Layer 7 and Oracle - Layer 7 and Oracle -
Layer 7 and Oracle -
 
How to Choose A SOA Gateway from Layer 7
How to Choose A SOA Gateway from Layer 7How to Choose A SOA Gateway from Layer 7
How to Choose A SOA Gateway from Layer 7
 
The New Governance - Scott Morrison CTO Layer 7 Technologies
The New Governance - Scott Morrison CTO Layer 7 TechnologiesThe New Governance - Scott Morrison CTO Layer 7 Technologies
The New Governance - Scott Morrison CTO Layer 7 Technologies
 
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
Liberating the API Economy with Scale-Free Networks - Mike Amundsen, Director...
 
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
API360 – A How-To Guide for Enterprise APIs - Learn how to position your ente...
 
Mastering Digital Channels with APIs
Mastering Digital Channels with APIsMastering Digital Channels with APIs
Mastering Digital Channels with APIs
 
Oracle API Gateway
Oracle API GatewayOracle API Gateway
Oracle API Gateway
 
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
API Design Methodology - Mike Amundsen, Director of API Architecture, API Aca...
 
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
Best Practices You Must Apply to Secure Your APIs - Scott Morrison, SVP & Dis...
 

More from CA API Management

Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...
Gartner AADI Summit Sydney 2014   Implementing the Layer 7 API Management Pla...Gartner AADI Summit Sydney 2014   Implementing the Layer 7 API Management Pla...
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...CA API Management
 
Using APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail ExperienceUsing APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail ExperienceCA API Management
 
Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ...
 Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ... Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ...
Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ...CA API Management
 
Clients Matter, Services Don't - Mike Amundsen's talk from QCon New York 2014
Clients Matter, Services Don't - Mike Amundsen's talk from QCon New York 2014Clients Matter, Services Don't - Mike Amundsen's talk from QCon New York 2014
Clients Matter, Services Don't - Mike Amundsen's talk from QCon New York 2014CA API Management
 
The Connected Car UX Through APIs - Francois Lascelles, VP Solutions Architec...
The Connected Car UX Through APIs - Francois Lascelles, VP Solutions Architec...The Connected Car UX Through APIs - Francois Lascelles, VP Solutions Architec...
The Connected Car UX Through APIs - Francois Lascelles, VP Solutions Architec...CA API Management
 
Is there an API in that (IoT)?
Is there an API in that (IoT)?Is there an API in that (IoT)?
Is there an API in that (IoT)?CA API Management
 
Truth, Lies & APIs - Ross Garrett, Director Product Marketing, CA Layer 7 @ G...
Truth, Lies & APIs - Ross Garrett, Director Product Marketing, CA Layer 7 @ G...Truth, Lies & APIs - Ross Garrett, Director Product Marketing, CA Layer 7 @ G...
Truth, Lies & APIs - Ross Garrett, Director Product Marketing, CA Layer 7 @ G...CA API Management
 
Your New Digital Business & APIs
Your New Digital Business & APIs Your New Digital Business & APIs
Your New Digital Business & APIs CA API Management
 
Mapping the API Landscape - Mike Amundsen, Director of API Architecture
Mapping the API Landscape - Mike Amundsen, Director of API ArchitectureMapping the API Landscape - Mike Amundsen, Director of API Architecture
Mapping the API Landscape - Mike Amundsen, Director of API ArchitectureCA API Management
 
Lean API Strategy - Holger Reinhardt, Snr Principal Business Unit Strategy, L...
Lean API Strategy - Holger Reinhardt, Snr Principal Business Unit Strategy, L...Lean API Strategy - Holger Reinhardt, Snr Principal Business Unit Strategy, L...
Lean API Strategy - Holger Reinhardt, Snr Principal Business Unit Strategy, L...CA API Management
 
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...CA API Management
 

More from CA API Management (11)

Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...
Gartner AADI Summit Sydney 2014   Implementing the Layer 7 API Management Pla...Gartner AADI Summit Sydney 2014   Implementing the Layer 7 API Management Pla...
Gartner AADI Summit Sydney 2014 Implementing the Layer 7 API Management Pla...
 
Using APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail ExperienceUsing APIs to Create an Omni-Channel Retail Experience
Using APIs to Create an Omni-Channel Retail Experience
 
Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ...
 Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ... Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ...
Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ...
 
Clients Matter, Services Don't - Mike Amundsen's talk from QCon New York 2014
Clients Matter, Services Don't - Mike Amundsen's talk from QCon New York 2014Clients Matter, Services Don't - Mike Amundsen's talk from QCon New York 2014
Clients Matter, Services Don't - Mike Amundsen's talk from QCon New York 2014
 
The Connected Car UX Through APIs - Francois Lascelles, VP Solutions Architec...
The Connected Car UX Through APIs - Francois Lascelles, VP Solutions Architec...The Connected Car UX Through APIs - Francois Lascelles, VP Solutions Architec...
The Connected Car UX Through APIs - Francois Lascelles, VP Solutions Architec...
 
Is there an API in that (IoT)?
Is there an API in that (IoT)?Is there an API in that (IoT)?
Is there an API in that (IoT)?
 
Truth, Lies & APIs - Ross Garrett, Director Product Marketing, CA Layer 7 @ G...
Truth, Lies & APIs - Ross Garrett, Director Product Marketing, CA Layer 7 @ G...Truth, Lies & APIs - Ross Garrett, Director Product Marketing, CA Layer 7 @ G...
Truth, Lies & APIs - Ross Garrett, Director Product Marketing, CA Layer 7 @ G...
 
Your New Digital Business & APIs
Your New Digital Business & APIs Your New Digital Business & APIs
Your New Digital Business & APIs
 
Mapping the API Landscape - Mike Amundsen, Director of API Architecture
Mapping the API Landscape - Mike Amundsen, Director of API ArchitectureMapping the API Landscape - Mike Amundsen, Director of API Architecture
Mapping the API Landscape - Mike Amundsen, Director of API Architecture
 
Lean API Strategy - Holger Reinhardt, Snr Principal Business Unit Strategy, L...
Lean API Strategy - Holger Reinhardt, Snr Principal Business Unit Strategy, L...Lean API Strategy - Holger Reinhardt, Snr Principal Business Unit Strategy, L...
Lean API Strategy - Holger Reinhardt, Snr Principal Business Unit Strategy, L...
 
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
 

Recently uploaded

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 

Recently uploaded (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 

Getting Into Mobile w/o Getting Into Trouble - Greg Kliewer, Sr Solutions Strategist, CA Technologies - SecTor

  • 1. Getting Into Mobile Without Getting Into Trouble Greg Kliewer Senior Solutions Strategist October, 2014
  • 2. 2 © 2014 CA. ALL RIGHTS RESERVED. The good old days Network separation No programmatic access from the Public Internet Safety through total isolation and control
  • 3. 3 © 2014 CA. ALL RIGHTS RESERVED. 56% Canadian smartphone ownership in 2013. Up from 33% in 2012 1 2013 Time spent on non- voice mobile surpasses time spent on workstations 3 2014 Smartphone and tablet sales surpass workstations 4 2 http://www.forbes.com/sites/benedictevans/2012/12/31/the-end-of-the-beginning-mobile-blows-past-pcs-so-what 2012 Mobile devices outnumber workstations by 2:1 2 3 http://www.emarketer.com/Article.aspx?R=1010095 4 http://www.gartner.com/newsroom/id/2610015 1 http://www.cbc.ca/news/business/smartphone-use-way-up-in-canada-google-finds-1.1384916
  • 4. 4 © 2014 CA. ALL RIGHTS RESERVED. Today
  • 5. 5 © 2014 CA. ALL RIGHTS RESERVED. Threats Inauthentic user Careless user Poorly coded apps Spoofed apps Lost or stolen devices Hijacked or tampered with devices
  • 6. What are you going to do about it? building blocks for secure mobile access
  • 7. 7 © 2014 CA. ALL RIGHTS RESERVED. Reverse proxy in the DMZ using a hardened platform •Terminate inbound connection •Establish a new connection to fulfill the request •The only open port to the public Internet should be 443 •All extraneous ports should be closed •All services not strictly necessary should be stopped or removed, preferably •Management ports are on separate network not accessible from the public Internet •Be ready to patch at a moment’s notice (e.g. heartbleed, bash shellshock)
  • 8. 8 © 2014 CA. ALL RIGHTS RESERVED. Validate user credentials before making the backend connection •Extract credentials •Validate them against the existing user directory •THEN make the backend connection
  • 9. 9 © 2014 CA. ALL RIGHTS RESERVED. PROBLEM It’s the app that calls the API. Do you want it holding on to the user’s username and password?
  • 10. 10 © 2014 CA. ALL RIGHTS RESERVED. Introduce an OAuth 2.0 Authorization Server … •Authenticate User •Authenticate App (request user to grant access to the App) •Issue an Access Token that represents an ephemeral session with the client •App Creds •Token Sessions with permissions •NOTE the requirement for a new set of credentials, identifying the app
  • 11. 11 © 2014 CA. ALL RIGHTS RESERVED. …and an OAuth 2.0 Resource Server •Validate Access Token •Retrieve permissions •Authorize access to requested resources •Rinse and repeat •App Creds •Token Sessions with permissions •The session eliminates the need for an app to cache or store the user credentials •Instead, you keep a temporary-use token for a short period of time
  • 12. 12 © 2014 CA. ALL RIGHTS RESERVED. PROBLEM Sessions can be hijacked.
  • 13. 13 © 2014 CA. ALL RIGHTS RESERVED. SOLUTION This one, at least, has a fairly simple solution.
  • 14. 14 © 2014 CA. ALL RIGHTS RESERVED. Keep the Access Token private •443 ONLY •Strong crypto only •App Creds •Token Sessions with permissions •The Access Token is a secret and must be treated as such. •Use HTTP keep alives to limit resource utilization impact. •You may want SSL acceleration for this. •Did we mention? Be ready to patch / step up key strength / cipher suite requirements at any time SSL / TLS
  • 15. 15 © 2014 CA. ALL RIGHTS RESERVED. PROBLEM Aren’t mobile devices and apps just inherently unsecure?
  • 16. 16 © 2014 CA. ALL RIGHTS RESERVED. •Relaxes device security (no screen lock) (no PIN / passphrase) •Leaves device behind at the gym or on the bus •Tricks user into downloading fake app •Steals phone, bypasses protections, unlocks it •Caches or persists user ID credentials •Stores sensitive data •Stores sensitive data without safeguards
  • 17. 17 © 2014 CA. ALL RIGHTS RESERVED. Mobile Device Management Mobile Application Management •Relaxes device security (no screen lock) (no PIN / passphrase) •Leaves device behind at the gym or on the bus •Tricks user into downloading fake app •Steals phone, bypasses protections, unlocks it •Caches or persists user ID credentials •Stores sensitive data •Stores sensitive data without safeguards
  • 18. 18 © 2014 CA. ALL RIGHTS RESERVED. SDKs can provide a lighter-weight solution •Takes security out of the hands of app devs (they will thank you!) •Tie in to device safeguards Key stores (hdw backed) Native Containers Biometrics Geolocation Remote control (for wipe) Manufacturer Attestation •Tie enhanced crypto to user authentication and consent Dynamic app secret provisioning Dynamic certificate provisioning Gateway SDK
  • 19. 19 © 2014 CA. ALL RIGHTS RESERVED. Solutions for secure enterprise mobility
  • 20. 20 © 2014 CA. ALL RIGHTS RESERVED. 1. Securely gate all access from mobile platforms Comprehensive Access Control MOBILE API GATEWAY Appliance Pre-hardened for exposure to public Internet Onboard OAuth 2.0 Authorization and Resource Servers Control sign on and sign off across apps, devices, and web properties Enforce multi-factor authentication (e.g. OTP, Biometrics, Attestation) Secure Platform MOBILE API GATEWAY
  • 21. 21 © 2014 CA. ALL RIGHTS RESERVED. 2. Extend your security reach onto the devices themselves PLATFORM SDKs Take security out of the hands of application developers Bind to device security primitives to leverage native capabilities (e.g. keystores, containers, hardware-backed crypto, biometrics, etc.) Block access from inauthentic applications Detect device and OS tampering MOBILE API GATEWAY SDK
  • 22. 22 © 2014 CA. ALL RIGHTS RESERVED. “The most radical and transformative of inventions are often those that empower others to unleash their creativity – to pursue their dreams.” -Jeff Bezos Come see us at booth 603
  • 23. Senior Solution Strategist Greg.Kliewer@ca.com @cainc slideshare.net/CAinc linkedin.com/company/ca-technologies ca.com Greg Kliewer