Android mobility best practice advisory   July 2016    Whether it's managing a few employee phones or an international fleet of devices, IT leaders  face many challenges when navigating the complexity of configuration options and mobile  partners.    To help address these challenges, this is the first in a series of advisories aimed at laying out a  set of best practices for IT decision makers to consider when using Android for Work. While not  an exhaustive list, we recommend customers reference these guidelines when evaluating  vendors and setting up their mobility environment. 

Executive summary    When deploying Android in the enterprise, security best practices should be applied throughout  a device’s lifecycle.     While setting up a device, company and personal data should be stored separately to ensure  corporate data can’t be accessed by personal apps. Enterprises should require company data  be encrypted on the device to protect it in the event of device loss. App distribution is another  key aspect of mobile deployment, and Play for Work provides a sophisticated first line of  defense against potentially harmful apps by using Google’s automatic malware detection  capabilities. To minimize the risk of malware being installed on the device, Android recommends  disabling installation of apps via other, or unknown, sources.    Once a device is provisioned, use the latest management APIs supported by your EMM on each  device to avoid taking a “lowest common denominator” approach to fleet management. Finally,  regular security patches play a critical role in maintaining a device’s security. IT decision makers  should take into account the device manufacturer’s commitment to security updates when  making purchasing decisions and considering which devices to support in their environment. 

Don’t allow application installation from “Unknown Sources”.    

Many Android devices have a security setting, often referred to as “Allow unknown sources”,  that determines whether applications can be installed from sources outside of the Google Play  store. To protect against ​potentially harmful applications ​(PHAs), Google recommends  customers deploy a policy to disallow installation of apps from sources other than Google Play.     As described in the ​2015 Android Security Year in Review​, apps from sources outside of Google  Play store are more likely to be potentially harmful. Devices that allow apps to be installed from  “unknown sources” had a 10x higher incidence rate of PHAs than devices that required apps be  installed via Google Play.    Google Play provides an important first line of defense against malicious apps. Using  techniques including static analysis, machine learning, and manual inspection, apps are first  reviewed before being made available to users. This process ensures that apps conform with  Google’s policies, and protects against potentially harmful applications from being installed via  the Google Play store.    For customers with internal corporate apps, ​Google Play for Work​ provides a ​secure way to  develop and distribute internal apps​ without allowing untrusted apps to be installed in the  device’s corporate profile. 

Consider security updates when determining devices to support    While security measures such as application isolation and profile separation provide protection  of enterprise data from other unauthorized apps, OS updates are equally important to ensure  those measures have continued effectiveness by patching identified bugs in a timely manner.    In 2015, Android launched a ​security update program​ in which ​security patches​ are published  on a monthly basis along with a bulletin describing the bugs fixed. Once a patch is issued,  OEMs work with their carrier partners to update affected devices.     The ​Nexus​ product line and certain devices from ​Samsung​ and ​Blackberry​ come with  commitments to support monthly security patches within a specified time­period, while others  may not issue security patches after a device is purchased. To reduce exposure to known  vulnerabilities, Google recommends customers consider availability of monthly Android security  updates when selecting devices and granting access to sensitive applications or data.    To check the update status of your managed devices, Android devices report their security  patch version via a ​build property on the device​, which is displayed in device settings as a  meaningful date and can be verified programmatically by any application. Customers should  work with their EMM to verify the update status of their devices and use that information as a  signal when assigning an appropriate level of access.  

Store work and personal data separately on the device    Bring your own device (BYOD) environments provide both cost savings for the company and  convenience for employees. But they can also pose challenges if personal and corporate data  isn’t stored separately on a device.     Separation of work and personal data ensures that personal apps can’t maliciously or  inadvertently access, modify, or leak corporate information. Similarly, users may be  uncomfortable with their personal apps being monitored ­­ companies risk inadvertently  collecting personally identifiable information, or deleting personal data on a lost device, if  personal and work data are stored together.    Google recommends splitting work and personal data on BYOD devices by storing them  separately (e.g., in different profiles) to avoid accessing personal information in corporate apps.  This approach provides for better protection of work data from personal apps, and allows IT to  enforce more granular policies, such as data encryption, remote wipe capabilities, network  proxies, and monitoring of work apps, while preserving the privacy of the employee’s personal  data.     

Require encryption of all work data    Physical security is an obvious concern for corporate data on mobile devices. ​Full disk  encryption​ was introduced in Android 3.0, and support is required on all capable Android 6.0+  devices meeting clearly defined hardware requirements found in the ​Android 6.0 Compatibility  Definition Documentation​.     To protect data at rest, Google recommends enforcing a policy that requires work data be  encrypted before a device is given access to sensitive information.    For additional security, consider requiring full disk encryption and a PIN or password to be  entered when starting the device. New devices running Android N may also support ​Direct Boot  and allow for encrypting work data separately. 

Use the latest management API on a device    Device Admin APIs​ were introduced in Android 2.2 to support an initial set of device  management scenarios. In Android 5.0, new ​Profile Owner and Device Owner APIs​ were added  to provide more granular controls better suited to BYOD and corporate­liable environments.   

Many EMMs support using the newest APIs available on a given device, even if those APIs  aren’t supported on all managed devices. Android for Work encourages customers and EMMs  to take a “best available” approach to management and use the latest profile or device owner  APIs, rather than reverting to the “lowest common denominator” supported across their fleet.  Older Device Admin APIs have been used in abuse scenarios and their scope will be reduced  starting in Android N. 

This advisory - googleusercontent.com

techniques including static analysis, machine learning, and manual inspection, apps are first ... New devices running Android N may also support ​Direct Boot.

98KB Sizes 0 Downloads 271 Views

Recommend Documents

This advisory - googleusercontent.com
should take into account the device manufacturer's commitment to security ... Bring your own device (BYOD) environments provide both cost savings for the ...

Advisory Groups: Advisory Councils and Committees
board, appoints a local advisory council for vocational education composed of public ... Career and technical education programs will have an advisory committee with .... The appointment of a council/committee member to two three-year terms ...

Advisory from EBRI
Apr 21, 2015 - HOW: By conference call: • Please RSVP by e-mail [email protected]. • To participate in the call: Phone Number: (262) 912-0552. Pass code: ...

Advisory from EBRI
Sep 27, 2013 - “Sources of Health Insurance and Characteristics of the Uninsured: Analysis of the March 2013 Current Population. Survey,” EBRI Issue Brief, ...

Transformation Advisory - Services
scaled solutions, and dedicated technical advisory. This service will help align overall business goals and drive change in legacy behavior over time. Key Activities. Transformation Lab. • Lab preparation: help define business objectives and agree

Advisory from EBRI
Sep 27, 2013 - Issue Brief, July 2012, http://www.ebri.org/pdf/briefspdf/EBRI_IB_07-2012_No373_Exchgs2.pdf. “Decisions Decisions,” (blog) Paul Fronstin, ...

media advisory -
greater awareness. With the theme “Touching Lives” the Candlelight Memorial wishes to highlight how HIV has touched the lives of many people. “Touching ...

DepEd Advisory - WordPress.com
Aug 23, 2011 - The Reading Association of the Philippines (RAP) will conduct its Midyear. Demofest 2011 with the theme "Reading Rizal: Pagsulong sa ...

Indian Education Advisory Council
Dec 16, 2015 - Roosevelt Room, Ramkota, Rapid City, SD. AGENDA ... Review of subcommittee meeting ... Presentation and review of NASAAC Final Report.

DHHS Health Advisory Fish Consumption Advisory ... - Catawba County
Apr 9, 2013 - A meal of fish is considered approximately 6 ounces of uncooked fish. PCBs may adversely impact the neurological development of children, the reproductive system, the immune system, and may cause cancer. Mercury presents an increased ri

PRESS ADVISORY
waste disposal, and pollution - and their disparate impact on the poor, on ethnic minorities and on indigenous people. We will work to reverse the real and ...

press advisory -
Jun 19, 2018 - AT GEORGETOWN POLICY INNOVATION FORUM TO ... Kevin Lembo is serving on a panel convened by Georgetown University's Center.

Advisory Tracker.pdf
NOT OFTEN. Elaborates on ideas to demonstrate in-depth understanding. ALWAYS. SOMETIMES. NOT OFTEN. Writing demonstrates mastery of mechanics.

Advisory from EBRI
Apr 21, 2015 - EBRI on Twitter: @EBRI or http://twitter.com/EBRI. Blog: https://ebriorg.wordpress.com/. EBRI RSS: http://feeds.feedburner.com/EBRI-RSS.

Media Advisory - California State Parks
Dec 4, 2017 - Information Officer. (916) 651-8725. California State Parks Seeks Public Input on the. Ferry Service Concession from Tiburon to Angel Island ...

Media Advisory - California State Parks
Oct 21, 2015 - ... on the state park, please visit California State Park's website. ###. About California's Drought. Every Californian should take steps to conserve water at home, ... and creating opportunities for high quality outdoor recreation.

Pedestrian Advisory Council -
and walkable city for people of all abilities;. WHEREAS, the City of Austin Sidewalk Master Plan / ADA Transition Plan promises at least $40 million per year.

Media Advisory - California State Parks
Dec 4, 2017 - TIBURON, Calif. – California State Parks is holding a public meeting to solicit comments on the future of the ferry service concession providing transportation to/from Tiburon to Angel Island State Park. In an effort to better serve a

media advisory - California State Parks
May 31, 2013 - A distinguished volunteer Commission will lead the initiative, designed to fulfill directives in the California State Parks. Stewardship Act of 2012 ...

Media Advisory - California State Parks
Oct 21, 2015 - Page 1. Facebook.com/CaliforniaStateParks www.parks.ca.gov ... and creating opportunities for high quality outdoor recreation. Subscribe to ...

Heat Advisory - Athletics.pdf
Watch/monitor athletes carefully for necessary action. 95 - 99 degrees. Heat Index. “Yellow Flag”. All Sports. Provide ample amounts of water. This means that ...

release and advisory
Illinois law stipulates that registered sex offenders may not reside in a home within ... of a school, playground or a facility providing daycare programs or services. ... about this and other press related items, visit the 375th Online Media Center.

Change Management Advisory - Services
Change management plays a significant role in getting employees to adopt new technology and work in new ways. Set the organization up for success by leveraging Google's best practices and field experience. As a strategic advisor, Google's Change Mana

Advisory 11.12.2017.pdf
3 days ago - condomsrepeated|ywhicharea||egedtobeindecentespecia||yforchildren. 2. In this connection aftention of TV channels is invited to Rule 7 (7\ ot. the cable Television Networks Rules, 1994 which specifically states that "No. advertisement wh