CSA SINGAPORE Mobile Cyber App User Guide

August 6, 2024
CSA SINGAPORE

CSA SINGAPORE Mobile Cyber App

Specifications

  • Product Name: Mobile Cyber Security Guide
  • Aligned to Cyber Essentials
  • Intended Audience: Organisations keen on securely deploying mobile devices or strengthening existing mobile deployments

Product Information

The Mobile Cyber Security Guide (Aligned to Cyber Essentials) is a cybersecurity resource designed to assist organizations in defending against mobile-specific risks as mobile device deployments increase and mobile threats become more targeted. It aligns with the Cyber Essentials mark certification standard.

Usage Instructions

Purpose & Intended Audience:

The guide serves as an implementation companion to the Cyber Essentials mark certification standard. It is aimed at organizations interested in securely deploying mobile devices or enhancing current mobile deployments.

Scope:

The guide focuses on three common types of mobile device deployments: Strict Enterprise Usage, Corporate-Owned Personally Enabled, and Bring Your Own Device (BYOD). Recommendations in this document are scoped to the BYOD model, suitable for smaller or less digitalized organizations starting their cybersecurity journey. For other deployment models, refer to CSA’s Guidelines for CII Owners to Enhance Cyber Security for 5G Use Cases.

BYOD Mobile Device Deployment Model:

BYOD involves using personally owned devices for work-related tasks. While it offers increased flexibility and access to organizational resources, it also poses unique security and privacy challenges to both organizations and device owners.

FAQ

  • Q: What is the target audience for the Mobile Cyber Security Guide?
    • A: The guide is intended for organizations looking to enhance mobile security through secure deployments or strengthening existing mobile practices.
  • Q: Which deployment models are covered in the guide?
    • A: The guide focuses on three common types of mobile device deployments: Strict Enterprise Usage, Corporate-Owned Personally Enabled, and Bring Your Own Device (BYOD).

Introduction

CSA Cyber Essentials mark and Cyber Trust mark are tiered cybersecurity standards that are designed to support the cybersecurity needs of a range of organizations. The Cyber Essentials mark takes on a baseline control approach and is intended to protect organizations against common cyberattacks. The Cyber Trust mark takes on a risk-based approach and is intended to enable organizations to put in place the relevant cybersecurity preparedness measures that are commensurate with their cybersecurity risk profile. Together, the Cyber Essentials mark and Cyber Trust mark provide a cybersecurity risk management framework for organizations. Globally, mobile devices have continued to proliferate and become increasingly woven into the fabric of our daily lives. Modern mobile devices have transformed how organizations deliver IT services, organisations are shifting to mobile device deployments for organizational business functions1. While mobility can enhance performance and productivity, mobile devices bring unique threats to organizations. As organizations embrace mobility, adversaries are refining their techniques to target mobile devices. Mobile threats are growing, and the industry has seen an increasing number of cases targeting mobile devices.
The “Mobile Cyber Security Guide (Aligned to Cyber Essentials)” helps organizations in their defence against mobile-specific risks as mobile device deployments rise and mobile threats become more targeted.

Purpose & Intended Audience

The “Mobile Cyber Security Guide (Aligned to Cyber Essentials)” is intended to serve as an implementation guide to accompany the Cyber Essentials mark certification standard, and should be read in conjunction with the Cyber Essentials mark certification standard. This guide is targeted at organisations keen on securely deploying mobile devices, or organisations keen on strengthening existing mobile deployments.

Scope

There are three (3) common types of mobile device deployments: (i) Strict Enterprise Usage, (ii) Corporate-Owned Personally Enabled, and (iii) Bring Your Own Device (BYOD). Cyber Essentials mark is targeted at smaller or less digitalized organizations that are starting out in their cybersecurity journey, such as Small and Medium Enterprises (SMEs). Correspondingly, this document provides recommendations scoped to Bring Your Own Device (BYOD) model, as small organizations tend to adopt such a model. For other mobile deployment models, organizations may wish to refer to CSA’s “Guidelines for CII Owners to Enhance Cyber Security for 5G Use Cases”, available at CSA’s website.

Bring Your Own Device (BYOD) Mobile Device Deployment Model

Bring Your Own Device (BYOD) refers to the practice of performing work-related activities on personally owned devices. Incorporating BYOD deployments into an organization can increase opportunities and methods available to access organizational resources, however, the increased flexibility and functionality of BYOD mobile devices present unique security and privacy challenges to both organizations and device owners.

To help organizations benefit from BYOD’s flexibility while protecting themselves from critical security and privacy challenges, this guide will address the following roles in the BYOD model:

  • End user organization
  • Mobile device owner

This approach enables the guide to capture the unique relationship between organizations and mobile device owners in BYOD deployment models. While organizations can implement and enforce various BYOD policies and security controls, mobile device owners remain the “device administrators”, with control over the installation of applications, device patching/updating, permissions granted to applications, and more. Therefore, the organization and device owner have distinct roles in managing the security of the organization and the mobile devices deployed within.

Balancing Cybersecurity and Privacy

A crucial factor of a successful BYOD deployment is establishing trust between the organization and the device owner. The integration of personal devices into the organizational environment necessitates a mutual understanding between the two parties, particularly if organisations collect data from employees’ personal devices. Data collection poses a cybersecurity and privacy risk that both the organization and device owners must address. Managing this risk requires striking a balance, ensuring the security of organisational data while respecting the privacy and autonomy of device owners. Understanding the personal nature of BYOD devices is important when implementing mobile security measures or protocols.
The recommendations in this guide take into account both cybersecurity and privacy risks faced by organizations.

References

In preparing this document, reference was made to the following publications:

  1. CSA Safe App Standard, Version 1.0
  2. CSA Guidelines for CII Owners to Enhance Cyber Security for 5G Use Cases, Version 1.0
  3. NIST Special Publication 800-124r2 Guidelines for Managing the Security of Mobile Devices in the Enterprise
  4. NIST Special Publication 1800-22 Mobile Device Security: Bring Your Own Device (BYOD)
  5. 2023 Global Mobile Threat Report, Zimperium
  6. NIST Privacy Framework: A Tool For Improving Privacy Through Enterprise Risk Management, Version 1.0

Acknowledgment is made for the use of information from the above publications.

Annex A: Mobile Cyber Security Guide (Aligned to Cyber Essentials)


Mobile Security Recommendation

| ****

End User Organisation Responsibility

| ****

Device Owner Responsibility

---|---|---
A.1 Assets: People
1. User education on mobile-specific threats and best practices


Why is this important:

·         With the increase on

sophistication and scope of mobile threats, user education is crucial in reducing the likelihood of these threats materializing.

| What should the organization do:

·         Organisations should enable training and awareness efforts by providing the necessary platforms and materials to employees e.g. security exercises,

training programs, formal education, etc.

·         Beyond the inclusion of general cyber awareness

training for employees, the organization should also include topics for business users managing or accessing mobile organizational resources to

understand why they play important roles in mobile security, and how they can operate securely.

| What should device owners do:

·         Device owners should enhance their education and awareness of mobile threats and best practices. This can include:

o   How to identify phishing attacks

o   How to properly manage authentication credentials

The organization’s privacy policy and personal information collected

o   Why apps should only be installed from trusted sources

Additional measures:

·         Insight on recent mobile security threats (e.g. phishing scams, malicious applications, etc.) can be found from various sources:

o   Cybersecurity campaigns

o   News forums

o   Global cybersecurity reports

A.2 Assets: Hardware and Software
2. Mobile Asset Inventory


Why is this important:

·         Knowledge of the organization’s mobile environment is the

| What should the organization do:

·         An up-to-date asset inventory of all mobile hardware (mobile devices) and software (mobile applications) assets should be maintained.

·         Mobile assets within the scope may include the following:

| What should device owners do:

·         Device owners should ensure that they have

received approval from the organization before using their mobile device in the organizational environment


Mobile Security Recommendation

| ****

End User Organisation Responsibility

| ****

Device Owner Responsibility

---|---|---
foundational step to monitoring and protecting the assets within.| o   BYOD mobile devices used in the organizational environment

o   Employees permitted to use BYOD mobile devices

o   Software applications used for the organization’s business purposes

·         Asset inventory lists should contain details of the assets where available:

o   For hardware assets (mobile devices) – hardware name/model, asset type, asset owner, department, approval/authorized date, etc.

o   For software assets (mobile applications) – software name, software publisher, software version, business purpose, approval/authorized date, etc.

|
3. Mobile application secure practices


Why is this important:

·         With the increase in the distribution of malicious applications via various channels, it is important for organizations to ensure their organization’s resources are protected against malware, and for device owners to avoid

downloading these malicious

applications.

| What should the organization do:

·         Organisations deploying in-house developed mobile applications should distribute apps via a dedicated mobile app store (e.g. Google Play Store, Apple App Store)


Additional measures:

·         Applications on mobile devices may be managed using mobile device management systems such as Mobile Device Management solutions, or

Enterprise Mobility Management solutions.

| What should device owners do:

·         Mobile device owners should only install

applications from official application stores (e.g.

Google Play Store, Apple App Store) as these

platforms have measures in place to detect and remove malicious applications

·         Mobile device owners should restrict the

permissions assigned to each app (e.g. camera access, location access) to only the permissions required


Mobile Security Recommendation

| ****

End User Organisation Responsibility

| ****

Device Owner Responsibility

---|---|---
| ·         The following restrictions can be applied to

applications on mobile devices depending on how a device is managed and enrolled into a device management system:

o   Restrict which app stores may be used

o   Restrict which apps may be installed via an allowlist or blocklist

o   Restrict permissions assigned to each app

o   Automatically install, update, or remove apps on a mobile device

o   Keep a current inventory of all apps installed on each device

·         Organisations can consider Mobile Application Vetting (MAV) solutions, that typically conduct automated tests and analyses on applications prior

to deployment into the organizational environment. This can be applied to both in-house developed and 3rd party applications.

|
4. Mobile device security policies


Why is this important:

·         Security policies provide a clear course of action for organizations to follow when deploying new

technologies, responding to security incidents, remediating issues, etc.

| What should the organization do:

·         Mobile device security policies can be established according to the organization’s security needs.

·         Mobile device security policies should define device configuration requirements for mobile devices that access organizational data.

o  Organisations may reference suggested secure mobile device configuration

guidance from established entities such as Center for Internet Security (CIS)

| What should device owners do:

·         Device owners should be made aware of all organizational mobile device security policies prior to deploying or onboarding their mobile

device onto the organizational environment, and signal their acknowledgement of the policy.


Mobile Security Recommendation

| ****

End User Organisation Responsibility

| ****

Device Owner Responsibility

---|---|---
| benchmarks, which are best-practice security configuration guides


·         Mobile device security policies should define standards, procedures, and restrictions for end users accessing organizational resources. These policies should address the following domains:

o   Access control – e.g. all mobile devices connecting to organisational resources must be pre-approved and in compliance with the organization’s security policies

o   Mobile Device Management – e.g. device owners shall allow the organisation to

install software/agents and collect telemetry from the device

o   Security – e.g. device owners must employ reasonable physical security measures to secure mobile devices from being lost or stolen

o   Organisational Protocol – e.g. device owners agree to immediately report to his/her manager on any incident or

suspected incidents of unauthorized data access, device loss, data loss, and/or

disclosure of company resources, databases, networks, etc.

·         Organisations should regularly review mobile device security policies to prevent weak or outdated security policies.

|


Mobile Security Recommendation

| ****

End User Organisation Responsibility

| ****

Device Owner Responsibility

---|---|---
A.3 Assets: Data
5. Data Storage & Privacy


Why is this important:

·         Protecting the privacy of

employees and their personal data stored on their mobile devices is important in enabling the organization’s BYOD policy.

| What should the organization do:

·         Organisations should clearly communicate BYOD policies to organizational leaders and employees to obtain support and provide transparency in

deploying BYOD

·         Organisations should maintain the privacy of employees by:

o   Providing concise and understandable

information about what data is collected from mobile devices

o   Only storing or collecting data when

necessary for transactions to reduce the impact of potential breaches

o   Securely storing data

·         Organisations should refer to and comply with local data retention laws and regulations when collecting data and telemetry from mobile devices in the organizational environment. Commonly used standards and data retention laws include (but are not limited to):

o   Personal Data Protection Act (PDPA)

o   General Data Protection Regulation (GDPR)

o   Payment Card Industry Data Security Standard (PCI DSS)

| What should device owners do:

·         Device owners are responsible for their own personal data, and should ensure that their personal photos, documents, location

information and other data is kept private and

inaccessible to others, including the organization

·         For storing sensitive data securely:

o   Device owners may leverage device

encryption to ensure the confidentiality of their mobile data

o   Otherwise, local storage options such as databases or files on the device itself can be used. This is a less secure option.


Mobile Security Recommendation

| ****

End User Organisation Responsibility

| ****

Device Owner Responsibility

---|---|---
A.4 Secure/Protect: Virus and malware protection
6. Antivirus applications for mobile devices


Why is this important:

·         Antivirus applications are

typically able to conduct malware detection, phishing detection, and network protection, amongst other features.

| What should the organization do:

·         Organisations should encourage device owners to install antivirus applications on their mobile

devices. Installation of antivirus applications may also be included as part of organizational mobile device security policies, ensuring compliance before mobile devices are allowed to connect to

organizational resources.

| What should device owners do:

·         Device owners should install antivirus

applications on their mobile device, and conduct regular automated or regular scans to detect and fix any issues

·         Device owners may take reference to CSA’s 5th National Cybersecurity Campaign, which

includes a list of mobile antivirus applications that have been tested and assessed on their effectiveness in Singapore’s current threat

landscape.

·         Device owners may also install ScamShield, an app that detects scam messages and blocks scam calls

A.5 Secure/Protect: Access Control
7. Strong mobile authentication


Why is this important:

·         Digital identity security threats, such as unauthorized access,

impersonation, and other types of fraudulent claims, pose a risk to organizational resources.

·         It is important for organizations to enforce and employ the

appropriate authenticators based on the assurance level required

| What should the organization do:

·         Organisations should implement and enforce strong authentication requirements to access

organizational resources.

·         Organisations should implement Multi-Factor Authentication (MFA) for high-risk transactions

using two or more of the following authentication factors:

o  Something-you-Know: Information the user knows such as passwords, PIN, patterns, etc.

| What should device owners do:

·         Device owners are responsible for authentication on their personal device, and should enable

strong lock-screen authentication such as biometric authentication to prevent

unauthorized access to their mobile device.

Additional measures:

·         Device owners can consider using credential management tools/software to protect any authentication credentials from unauthorized disclosure


Mobile Security Recommendation

| ****

End User Organisation Responsibility

| ****

Device Owner Responsibility

---|---|---
to access organizational

resources and digital services.

| o   Something-you-Have: This requires the user to possess a physical device, application, or token that generates a time-based One-

Time Password (OTP) such as software tokens, hardware tokens, etc.

o   Something-you-Are: This involves biometric authentication where the user’s unique physical characteristics are used for

verification such as fingerprints, facial recognition, etc.

o   Further details on the implementation of the above authentication factors can be found in CSA’s “Safe App Standards”

·         Organisations should implement and enforce policies and practices that govern the use of authenticators, for e.g. implementing a strict

password policy that requires users to set strong passwords and rotate them regularly


Additional measures:

·         Organisations can consider partitioning the functionality of digital services to allow less sensitive data/functions to be available at lower levels of assurance.

·         Organisations can consider additional requirements on authentication:

o  Rate limiting to limit consecutive failed authentication attempts

|


Mobile Security Recommendation

| ****

End User Organisation Responsibility

| ****

Device Owner Responsibility

---|---|---
A.6 Secure/Protect: Secure Configuration
8. Secure mobile connections to organizational resources


Why is this important:

·         Secure mobile connections to organisational resources to reduce the risk of data breaches,

unauthorized access, or

eavesdropping of organizational information, all of which could result in financial, reputational, and legal consequences to the organization.

| What should the organization do:

·         Organisations should leverage strong encryption technologies such as a Virtual Private Network

(VPN) to protect the confidentiality and integrity of the organization’s communications, as well as

mutual authentication mechanisms to verify the identities of both endpoints before transmitting data

·         Organisations should prohibit the use of unsecured Wi-Fi networks


Additional Measures:

·         VPNs can assist in ensuring all organisation-approved applications on mobile devices rely on TLS and are unable to be downgraded to HTTP.

| What should device owners do:

·         Device owners should not use unsecure Wi-Fi networks when connecting to enterprise

resources (e.g. public Wi-Fi)

A.7 Update
9. Rapid adoption of software updates


Why is this important:

·         Software updates provide new features and address newly

discovered security vulnerabilities

| What should the organization do:

·         Organisations should enforce the rapid adoption of software updates of organisation in-house

developed applications, or any 3rd party

applications utilized by the organization. This can be done via restricting access to organizational

resources from devices with outdated applications.

| What should device owners do:

·         Mobile device owners should rapidly adopt security updates and patches of applications and device OS


Mobile Security Recommendation

| ****

End User Organisation Responsibility

| ****

Device Owner Responsibility

---|---|---
A.9 Respond: Incident response
10. Revocation of access to organizational resources


Why is this important:

·         In the event of a cyber-attack, data breach, or device loss, organizations should have security policies and rules that

influence remediation actions for mobile devices

·         Remediation actions may span a spectrum of possibilities ranging from notifying the affected

individuals to revoke access to organizational resources

| What should the organization do:

·         Organisations should develop a clear incident

response plan that includes remediation actions to be taken in the event of a mobile-related security

incident, and ensure that the plan is made accessible to all employees

·         Organisations should notify users in the event of a cyber-attack or breach via channels such as push notifications or SMS

·         Organisations should temporarily revoke access to organizational resources of affected individuals and devices while the issue is being remediated to

minimize potential unauthorized access to organizational resources by malicious actors

| What should device owners do:

·         Mobile device owners who are suspicious that

their device may have been compromised should immediately notify appropriate parties such as CISOs, Reporting Officers, or IT support to obtain guidance on the necessary steps to address the

issue

Annex B: Additional Cybersecurity Tools

**** The following table covers additional cybersecurity tools that organizations may consider. These cybersecurity tools will aid in fulfilling the Cyber Essentials clauses.

Additional Cybersecurity Tools

|

Recommendation

---|---
Device Management Systems

·         Device management is most commonly

implemented via systems such as Mobile Device Management (MDM) and Enterprise Mobility Management (EMM) solutions.

·         These systems offer a range of security

capabilities, and aid in mitigating threats to the organization’s use of mobile devices, such as

information disclosure arising from device

loss/theft, insecure access of organizational resources via misconfigured or compromised devices, and more

| ·         Organisations can consider using Device Management Systems such as MDM and EMM, that offer a wide range of capabilities. Organizations should identify the capabilities required to work effectively within their organization before acquiring a Device Management System.

·         Device Management Systems should minimally be able to:

o   Support the mobile devices deployed in the organization’s environment

o   Enforce security policies on a mobile device, which can configure or restrict the use of mobile functionality and security capabilities

o   Define and enforce user and device authentication

o   Define and enforce protections for data communications and on-device data storage

o   Integrate with the organization’s infrastructure (i.e. any on-promise operations, support for a SaaS model, or product certifications/accreditations and 3rd party service

integrations)

Mobile threat defense (MTD)

·         MTD systems typically are able to detect network-based attacks (e.g. MITM), application-based attacks (e.g. malicious, sideloaded apps), phishing attacks, and more

·         These systems can offer multiple remediation approaches in the event of an attack attempt, data breach, or compromised device

| ·         Organisations should consider implementing Mobile Threat Defence (MTD) systems to detect and protect mobile devices, apps, and end users against attacks.

·         MTD systems should minimally have the following capabilities:

o   Malware detection,

o   Phishing detection, and

o   Network protection (Wi-Fi scanning)

·         MTD systems may be integrated with existing mobile device management systems in the organization to enable user and administrator alerts, automated response to remediate detected vulnerabilities, or quarantine apps and devices

Mobile Application Development Security

·         Mobile Application Development Security

includes necessary security controls and best practices to better protect applications, and in turn, their end users

| ·         Application development is more commonly outsourced to app developers and providers

·         If organisations intend to develop their own in-house applications, they should refer to CSA’s Safe App Standard which provides a common benchmark and guidance on securing

applications and end users against common malware and phishing attempts

---|---

Read User Manual Online (PDF format)

Read User Manual Online (PDF format)  >>

Download This Manual (PDF format)

Download this manual  >>

Related Manuals