Mobile apps and security by design
Ollie Whitehouse, Associate Director - NCC Group
Agenda
•Challenges
•Benefits
• Features
• Privacy
• Product security
•Assurance and COTS
•Response planning
Problem Statement
“How to develop or purchase COTS
mobile apps for my enterprise while
ensuring security.”
Real-world challenges
•Cost
•Timelines
•Available security skill-set
•Trust in underlying
technologies
•COTS, the big black box
Reality
•Last minute security can lead to
•Poor user experience
•Risk of fundamental flaws
•Implementation issues
•Higher expense and wasted
effort
•…. Band-Aid solutions
How do we know this?
•Secure Development Life-cycles!
•Security earlier is
•Cheaper
•Easier
•More integrated
•Less likely to be wrong
How do we know this?
•Issues found during final testing
•Back to development
•Re-testing (functional)
•Issues found after release
•All of the above
•Customer support costs
•Regulatory, press / brand etc.
•…
Put another way..
“Those practicing SDL specifically
reported visibly better ROI results
than the overall population.“
- Forester research
But it’s not without cost…
~14% extra effort
What do we care about?
•Functionality
•Security has a bad reputation
•Security is seen as impeding
•Privacy
•Users and customers
•Security
•Risk and regulator
•Integrity and data protection
Feature benefits
•Meet your risk appetite
•User friendly (UX etc.)
•Measured
•Integrated
•Lower risk of fundamental
issues
Privacy benefits
•Regulatory compliance
•Publically acceptable
•Consumer versus employee
•Internet versus VPN
•… concepts like do not track etc …
•Consideration around
•What we send, how we send,
what we store and how we store
Security benefits
•Baked in (intrinsic to the fabric)
•Defence in depth
•Easy (automatic?) to upgrade
•Auditing / logging
•Authentication / authorisation
•Transport security
•Data at rest security
Mobile security by design
•User experience
•Authentication
•Authorisation
•Storage
•Logging
•Transport
•Upgradability
•Device / user identification
The COTS challenge
•Marketing buzzword bingo
•3rd party development practices
•Gaining assurance
… in code and processes
… ideally via code access (rare!)
… likely black-box security assessments
… we don’t want to outsource risk
If it all goes wrong
•Security response processes
•Internally developed
•Escalation points?
•Vendor relationships
•Who would you call?
•Legal agreements?
•Security SLAs?
•Short term mitigations?
Summary
•Consider security & risk early
•Design security in from the start
•Test security early, test often
•Bigger locks != better security
•Consider user base
•Consider underlying technologies
•Consider tech/user case constraints
•Coax COTS vendors to improve
UK Offices
Manchester - Head Office
Cheltenham
Edinburgh
Leatherhead
London
Thame
North American Offices
San Francisco
Atlanta
New York
Seattle
Australian Offices
Sydney
European Offices
Amsterdam - Netherlands
Munich - Germany
Zurich - Switzerland
Ollie Whitehouse
ollie.whitehouse@nccgroup.com
Thanks! Questions?

More Related Content

PDF
2012 12-04 --ncc_group_-_mobile_threat_war_room
PDF
Current & Emerging Cyber Security Threats
PPTX
Practical SME Security on a Shoestring
PPTX
The Mobile Internet of Things and Cyber Security
PPTX
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
PPTX
Understanding passwordless technologies
PDF
Locking down server and workstation operating systems
PDF
10 Security issues facing NZ Enterprises
2012 12-04 --ncc_group_-_mobile_threat_war_room
Current & Emerging Cyber Security Threats
Practical SME Security on a Shoestring
The Mobile Internet of Things and Cyber Security
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Understanding passwordless technologies
Locking down server and workstation operating systems
10 Security issues facing NZ Enterprises

What's hot (20)

PPTX
Essential Layers of IBM i Security: System-Access Security
PPTX
Erik Nachbahr "Dealership Technology"
PPTX
Threat Modeling - Locking the Door to Vulnerabilities
PDF
Securing your presence at the perimeter
PDF
Zero Trust Model Presentation
PPT
Qualys user group presentation - vulnerability management - November 2009 v1 3
PPTX
Cyber Security Overview for Small Businesses
PPTX
2015 Endpoint and Mobile Security Buyers Guide
PPTX
Security Testing for IoT Systems
PPT
Competitive Cyber Security
PDF
Hijacking a Pizza Delivery Robot (using SQL injection)
PPTX
How to create a secure IoT device
PDF
Ransomware ly
PDF
New VIPRE_DS_EndpointSecurity_2016
PDF
Controlling Access to IBM i Systems and Data
PDF
Expand Your Control of Access to IBM i Systems and Data
PDF
Cybersecurity for modern industrial systems
PPTX
Cyber Security # Lec 2
PDF
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
PDF
NIST Zero Trust Explained
Essential Layers of IBM i Security: System-Access Security
Erik Nachbahr "Dealership Technology"
Threat Modeling - Locking the Door to Vulnerabilities
Securing your presence at the perimeter
Zero Trust Model Presentation
Qualys user group presentation - vulnerability management - November 2009 v1 3
Cyber Security Overview for Small Businesses
2015 Endpoint and Mobile Security Buyers Guide
Security Testing for IoT Systems
Competitive Cyber Security
Hijacking a Pizza Delivery Robot (using SQL injection)
How to create a secure IoT device
Ransomware ly
New VIPRE_DS_EndpointSecurity_2016
Controlling Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and Data
Cybersecurity for modern industrial systems
Cyber Security # Lec 2
FLIGHT Amsterdam Presentation - Don’t Let Open Source Software Kill Your Deal
NIST Zero Trust Explained
Ad

Viewers also liked (14)

PPTX
2013 07-12 ncc-group_data_anonymisation_technical_aspects_v1 0
PDF
How we breach small and medium enterprises (SMEs)
PDF
Pki 202 Architechture Models and CRLs
PPTX
Mobile App Security: Enterprise Checklist
PPTX
Exploiting appliances presentation v1.1-vids-removed
PDF
NCC Group 44Con Workshop: How to assess and secure ios apps
PDF
Cryptography101
PDF
07182013 Hacking Appliances: Ironic exploits in security products
PPTX
PDF
USB: Undermining Security Barriers
PDF
Pki 201 Key Management
PDF
Andy Davis' Black Hat USA Presentation Revealing embedded fingerprints
PDF
Docking stations andy_davis_ncc_group_slides
PDF
Real World Application Threat Modelling By Example
2013 07-12 ncc-group_data_anonymisation_technical_aspects_v1 0
How we breach small and medium enterprises (SMEs)
Pki 202 Architechture Models and CRLs
Mobile App Security: Enterprise Checklist
Exploiting appliances presentation v1.1-vids-removed
NCC Group 44Con Workshop: How to assess and secure ios apps
Cryptography101
07182013 Hacking Appliances: Ironic exploits in security products
USB: Undermining Security Barriers
Pki 201 Key Management
Andy Davis' Black Hat USA Presentation Revealing embedded fingerprints
Docking stations andy_davis_ncc_group_slides
Real World Application Threat Modelling By Example
Ad

Similar to 2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design (20)

PPTX
Security Imeprative for iOS and Android Apps
PPT
Mobile application security and threat modeling
PDF
Application Security in an Agile World - Agile Singapore 2016
PPT
Security Testing for Mobile and Web Apps
PDF
CNIT 128 8: Mobile development security
PDF
Mobile Application Security by Design
 
PPTX
Hacker vs Tools: Which to Choose?
PPTX
Hacker vs tools
PPTX
Keeping Secrets on the Internet of Things - Mobile Web Application Security
PDF
24 031030davidtillemanssecuresdlcpub-110325054740-phpapp02
PDF
Mobile SSO: Give App Users a Break from Typing Passwords
PPTX
Owasp summit slides day 2
PPT
Embracing the IT Consumerization Imperative NG Security
PPTX
SOC: Use cases and are we asking the right questions?
PDF
Threat modelling & apps testing
PDF
Application Security - Your Success Depends on it
PPSX
You built a security castle and forgot the bridge…now users are climbing your...
PDF
TRUSTe Online Security Guidelines v2.0
PPTX
Agile software security assurance
Security Imeprative for iOS and Android Apps
Mobile application security and threat modeling
Application Security in an Agile World - Agile Singapore 2016
Security Testing for Mobile and Web Apps
CNIT 128 8: Mobile development security
Mobile Application Security by Design
 
Hacker vs Tools: Which to Choose?
Hacker vs tools
Keeping Secrets on the Internet of Things - Mobile Web Application Security
24 031030davidtillemanssecuresdlcpub-110325054740-phpapp02
Mobile SSO: Give App Users a Break from Typing Passwords
Owasp summit slides day 2
Embracing the IT Consumerization Imperative NG Security
SOC: Use cases and are we asking the right questions?
Threat modelling & apps testing
Application Security - Your Success Depends on it
You built a security castle and forgot the bridge…now users are climbing your...
TRUSTe Online Security Guidelines v2.0
Agile software security assurance

Recently uploaded (20)

PPTX
Microsoft User Copilot Training Slide Deck
PDF
giants, standing on the shoulders of - by Daniel Stenberg
PDF
A hybrid framework for wild animal classification using fine-tuned DenseNet12...
PDF
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
PPTX
Internet of Everything -Basic concepts details
PPTX
MuleSoft-Compete-Deck for midddleware integrations
PDF
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
PDF
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
PDF
4 layer Arch & Reference Arch of IoT.pdf
PDF
The AI Revolution in Customer Service - 2025
PDF
IT-ITes Industry bjjbnkmkhkhknbmhkhmjhjkhj
PDF
Human Computer Interaction Miterm Lesson
PPTX
SGT Report The Beast Plan and Cyberphysical Systems of Control
PDF
Advancing precision in air quality forecasting through machine learning integ...
PDF
Lung cancer patients survival prediction using outlier detection and optimize...
PDF
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
PDF
Auditboard EB SOX Playbook 2023 edition.
PDF
A symptom-driven medical diagnosis support model based on machine learning te...
PDF
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
PDF
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
Microsoft User Copilot Training Slide Deck
giants, standing on the shoulders of - by Daniel Stenberg
A hybrid framework for wild animal classification using fine-tuned DenseNet12...
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
Internet of Everything -Basic concepts details
MuleSoft-Compete-Deck for midddleware integrations
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
4 layer Arch & Reference Arch of IoT.pdf
The AI Revolution in Customer Service - 2025
IT-ITes Industry bjjbnkmkhkhknbmhkhmjhjkhj
Human Computer Interaction Miterm Lesson
SGT Report The Beast Plan and Cyberphysical Systems of Control
Advancing precision in air quality forecasting through machine learning integ...
Lung cancer patients survival prediction using outlier detection and optimize...
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
Auditboard EB SOX Playbook 2023 edition.
A symptom-driven medical diagnosis support model based on machine learning te...
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf

2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design

  • 1. Mobile apps and security by design Ollie Whitehouse, Associate Director - NCC Group
  • 2. Agenda •Challenges •Benefits • Features • Privacy • Product security •Assurance and COTS •Response planning
  • 3. Problem Statement “How to develop or purchase COTS mobile apps for my enterprise while ensuring security.”
  • 4. Real-world challenges •Cost •Timelines •Available security skill-set •Trust in underlying technologies •COTS, the big black box
  • 5. Reality •Last minute security can lead to •Poor user experience •Risk of fundamental flaws •Implementation issues •Higher expense and wasted effort •…. Band-Aid solutions
  • 6. How do we know this? •Secure Development Life-cycles! •Security earlier is •Cheaper •Easier •More integrated •Less likely to be wrong
  • 7. How do we know this? •Issues found during final testing •Back to development •Re-testing (functional) •Issues found after release •All of the above •Customer support costs •Regulatory, press / brand etc. •…
  • 8. Put another way.. “Those practicing SDL specifically reported visibly better ROI results than the overall population.“ - Forester research
  • 9. But it’s not without cost… ~14% extra effort
  • 10. What do we care about? •Functionality •Security has a bad reputation •Security is seen as impeding •Privacy •Users and customers •Security •Risk and regulator •Integrity and data protection
  • 11. Feature benefits •Meet your risk appetite •User friendly (UX etc.) •Measured •Integrated •Lower risk of fundamental issues
  • 12. Privacy benefits •Regulatory compliance •Publically acceptable •Consumer versus employee •Internet versus VPN •… concepts like do not track etc … •Consideration around •What we send, how we send, what we store and how we store
  • 13. Security benefits •Baked in (intrinsic to the fabric) •Defence in depth •Easy (automatic?) to upgrade •Auditing / logging •Authentication / authorisation •Transport security •Data at rest security
  • 14. Mobile security by design •User experience •Authentication •Authorisation •Storage •Logging •Transport •Upgradability •Device / user identification
  • 15. The COTS challenge •Marketing buzzword bingo •3rd party development practices •Gaining assurance … in code and processes … ideally via code access (rare!) … likely black-box security assessments … we don’t want to outsource risk
  • 16. If it all goes wrong •Security response processes •Internally developed •Escalation points? •Vendor relationships •Who would you call? •Legal agreements? •Security SLAs? •Short term mitigations?
  • 17. Summary •Consider security & risk early •Design security in from the start •Test security early, test often •Bigger locks != better security •Consider user base •Consider underlying technologies •Consider tech/user case constraints •Coax COTS vendors to improve
  • 18. UK Offices Manchester - Head Office Cheltenham Edinburgh Leatherhead London Thame North American Offices San Francisco Atlanta New York Seattle Australian Offices Sydney European Offices Amsterdam - Netherlands Munich - Germany Zurich - Switzerland Ollie Whitehouse [email protected] Thanks! Questions?