INITIAL ENTERPRISE CHALLENGE:

Similar documents
The Aruba Mobile Virtual Enterprise for Government. The Next Generation Network Access Architecture for Mobile Technology

The Device Has Left the Building

DoD Mobility Mobility Product Security Certification Processes

Introducing Unified Critical Communications

Mobile Devices prioritize User Experience

October 2016 Issue 07/16

Securing Institutional Data in a Mobile World

The Mobile Risk Management Company. Overview of Fixmo and Mobile Risk Management (MRM) Solutions

MaaS360 Secure Productivity Suite

Verizon Software Defined Perimeter (SDP).

Securing BYOD With Network Access Control, a Case Study

AirWatch Container. VMware Workspace ONE UEM

INDOOR POSITIONING ANALYTICS

Automated Mobile Security (ESUKOM)

ADVANCED ATTACKS AGAINST MOBILE/IOT DEVICES

Thomas Lippert Principal Product Manager. Sophos Mobile. Spring 2017

DEPARTMENT OF THE NAVY UNITED STATES NAVAL ACADEMY 121 BLAKE ROAD ANNAPOLIS MARYLAND

Motorola Communications Platform

Lookout Mobile Endpoint Security. AirWatch Connector Guide

DATABASE SECURITY REQUIREMENTS GUIDE (SRG) TECHNOLOGY OVERVIEW. Version 2, Release October Developed by DISA for the DoD

Mobile Communication Device Contract Consolidation for State Agencies. Report to the Joint Legislative Oversight Committee on Information Technology

How to Secure ipads, Tablets and Android Devices for Corporate Use. John Masserini CISO Dow Jones

BeOn Security Cybersecurity for Critical Communications Systems

Managing BYOD Networks

ForeScout Extended Module for VMware AirWatch MDM

MICROSOFT SQL SERVER 2016 SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) OVERVIEW. Version 1, Release March 2018

HPE Intelligent Management Center

Mobile Security using IBM Endpoint Manager Mobile Device Management

Answers To The 4 Most Important Questions About Mobile Computing"

Zero Trust with Okta: A Modern Approach to Secure Access from Anywhere. How Okta enables a Zero Trust solution for our customers

Secure IT consumeration (BYOD), users will like you How to make secure access for smart mobile devices

Requirements for Building Effective Government WLANs

Cloud Mobility: Meraki Wireless & EMM

Changing face of endpoint security

Meraki Solution Brochure

VCalm S-12. Speed Feedback Radar Sign

Forescout. eyeextend for VMware AirWatch. Configuration Guide. Version 1.9

Implementing Your BYOD Mobility Strategy An IT Checklist and Guide

Securing Today s Mobile Workforce

Vocera Secure Texting 2.1 FAQ

BYOD Business year of decision!

Meraki 2018 Solution Brochure

ForeScout Extended Module for MaaS360

AirWatch for Android Devices for AirWatch InBox

MObile. end. complexity

Driving the Need for Mobile Device Management (MDM)

Go mobile. Stay in control.

The Net-Enabled Future:

PULSE CONNECT SECURE APPCONNECT

Mobile Derived Credentials Purebred Information Brief

2. Install The AirWatch App Once connected to the internet, download and install the AirWatch MDM Agent app from the Apple App Store.

10 Considerations for a Cloud Procurement. March 2017

Network Access Control

3-Part Guide to Developing a BYOD Strategy

DoD Wireless Smartphone Security Requirements Matrix Version January 2011

Forescout. eyeextend for IBM MaaS360. Configuration Guide. Version 1.9

MICROSOFT (MS) WINDOWS DEFENDER ANTIVIRUS SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) OVERVIEW. Version 1, Release 4 27 APRIL 2018

Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER

Juniper Vendor Security Requirements

Faculty/Presenter Disclosure

DoD ANNEX FOR PROTECTION PROFILE FOR APPLICATION SOFTWARE V1.2. Version 1, Release February Developed by DISA for the DoD

Delivering a Secure BYOD Solution with XenMobile MDM and Cisco ISE

Publishing Enterprise Web Applications to BYOD using a Granular. Trust Model. Shachaf Levi IT Client Security & Connectivity May 2013.

Secure, cloud-based workflow, alert, and notification platform built on top of Amazon Web Services (AWS)

The Maximum Security Marriage: Mobile File Management is Necessary and Complementary to Mobile Device Management

JUNE Driving mission success. Modernizing the Navy Marine Corps Intranet

Mobile - I ISTE-190, Fall

Convergence Everywhere

Data Sheet Instant Connect Mobile Client When your business is on the line, Instant Connect is here for your most critical communications needs. Welco

White paper. Combatant command (COCOM) next-generation security architecture

BYOD: BRING YOUR OWN DEVICE.

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.

NEN The Education Network

Google Cloud & the General Data Protection Regulation (GDPR)

Five Tips to Mastering Enterprise Mobility

Overview. Premium Data Sheet. DigitalPersona. DigitalPersona s Composite Authentication transforms the way IT

Procedure: Bring your own device

Bring Your Own Device (BYOD) Best Practices & Technologies

THREE-PART GUIDE TO DEVELOPING A BYOD STRATEGY WHITE PAPER FEBRUARY 2017

Wireless Mobile Workforce

NATIONAL GUIDELINES ON CLOUD COMPUTING FOR GOVERNMENT, MINISTRIES, DEPARTMENTS AND AGENCIES

Securing Wireless Mobile Devices. Lamaris Davis. East Carolina University 11/15/2013

SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT

2016 STUDY TOP SIX PRIORITIES FOR TEAM COMMUNICATIONS

Leveraging Smartphone Technology for Offender Monitoring. Technology in Corrections: Challenges for the Future, Prague 2017

Mobile Edge Computing Presented by Nurit Sprecher (ETSI ISG MEC Chair) Location Based Services Event, June 2-3, 2015, London, UK

Google Identity Services for work

Who s Protecting Your Keys? August 2018

Strategies for the Implementation of PIV I Secure Identity Credentials

SEPARATING WORK AND PERSONAL

Wireless Field Data Backhaul

The Value of Cisco Compatible Extensions (CCX) for Mobile Computers

DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL. June 14, 2018

2016 BITGLASS, INC. mobile. solution brief

IBM Lotus Notes Traveler

ENTERPRISE MOBILITY TRENDS

Dr. Stuart Dickinson Dr. Donald H. Steinbrecher Naval Undersea Warfare Center, Newport, RI May 10, 2011

DoD Mobility briefing for the AFCEA Mobility Summit

Kodiak Broadband PTT for Public Safety

VMware Hybrid Cloud Solution

Transcription:

LEVERAGING OUR NATION S INNOVATORS INITIAL ENTERPRISE CHALLENGE: LOCATION BASED SERVICES CHALLENGE ISSUED: 06.20.2016 POC: TIM MARTIN, INNOVATION ASSESSMENT LEAD

INITIAL ENTERPRISE CHALLENGE: LOCATION BASED SERVICES DESCRIPTION OF NEED/PROBLEM The US Navy is seeking to expand the use of government-owned tablets and mobile phones to allow for processing and storage of Controlled Unclassified Information (CUI). Many sailor and civilian roles require secure, convenient access to manuals, government information, and applications that process data at the CUI level and above. Location services will provide the foundation for additional functionality to solve problems in a more cost effective manner. This effort aims to bring new location based services to the Navy Enterprise Network (NEN), where location services are not currently being utilized. Commercially available technologies for remote administration, data at rest encryption, and remote data erasure combined with location based services can enable Navy civilians and sailors to use mobile devices in new and more effective ways while retaining a strong security posture. The initial focused deployment effort is currently expected to exist within the scope of one or more small indoor areas and include one larger outdoor area. That deployment is described more fully in the use case below, however extensibility into further environments will be evaluated as a positive feature, so EC responses are encouraged to address further use cases to exemplify additional valuable capabilities. Potential solutions should clearly indicate which wireless radios (GPS, Cellular, WiFi, Bluetooth, RFID...) are necessary for location positioning and which radios are optional for systems to utilize when determining location. The solution reponses should indicate their level of location precision and factors which may influence that precision. 01

The Navy also seeks information about how to securely perform location services. This may include preventing location spoofing or inhibiting information relayed from trusted devices. The ability to identify unauthorized devices within predetermined locations may be a valuable capability provided by location aware solutions. The more functional capabilities which can be enabled and controlled with respect to utilizing apps, data, or network shares a potential solution can provide, the better that solution will be considered. Current NEN mobile devices are managed with the Good For Enterprise managed container system, and functional integration with that service will be considered a positive. Some future objectives under consideration are the addition of location awareness for laptops, or further extension of device to include Bring Your Own Device (BYOD) systems but current Navy policy holds this objective outside the scope of the current Enterprise Challenge. The following are some of the requirements which have been identified for a potential LBS system. 1. System shall provide Location Service that produces end user device location data. 2. Shall integrate with the current NMCI approved Good for Enterprise MDM to manage and enforce policy system. 3. Shall take input from the system s 802.11 wireless access point device infrastructure to determine location. 4. Shall operate on NMCI approved infrastructure platform hardware and operating systems. 5. Shall provide location data usable to update and enforce policy on end user devices. 6. May utilize location data from end user devices to supplement location and position information based on non-wifi capabilities. (e.g. GPS, Cellular, Bluetooth, RFID) 7. Shall integrate with NMCI approved end user devices (specifically tablet and smartphone). 8. System shall integrate with existing 802.11 wireless access points that will be utilized to determine the location of end user devices by a Location Service. 9. May provide directional antennas to enhance location determination capabilities in targeted locations. 10. May provide additional 802.11 wireless access points / radios for greater data capacity and/or location determination capabilities. 11. May provide unauthorized device detection data to the system s Location Service. 12. Shall be certifiable by applicable DoD certification bodies. (e.g. UC-APL for data service devices,...) 02

IDENTIFIED REQUIREMENTS Shall not reduce security posture in any way. Shall interoperate with existing Mobile Device Managers (MDMs): Good For Enterprise. NEN constraints: No Bluetooth radio usage due to policy. NEN constraints: Only Android/iOS/Windows systems supported. Geofence / Positioning standards are not established, a system objective may be to avoid vendor lock-in based on proprietary methods. USE CASES In Navy-controlled premises, documentation is made accessible on end user devices, and related device functionality (such as camera, screenshot) is disabled. While not in Navy-controlled premises, documentation is not accessible on end user devices, and related device functionality (such as camera, screenshot) is enabled. The first Navy-controlled premise for system testing is anticipated to include an outdoor pier area approximately 200m by 100m; and two separate indoor areas including a workshop approximately 10,000 sq. ft. (mostly open) which may or may not be contained within the outdoor pier area, and potentially a shipboard area approximately 1,000 sq. ft. (multiple undefined wireless impairments). POLICY Location Services capabilities (infrastructure) will be influenced by RF policy within potential Navy deployment sites. Current policies and STIGs are under review for applicability. (More specific information may be provided at a later date.) REFERENCES Use of Commercial Wireless Devices, Services, and Technologies in the Department of Defense (DoD) Global Information Grid (GIG) http://www.dtic.mil/whs/directives/corres/pdf/810002p.pdf, 04/23/2007 IASE, Good for Enterprise 8.x STIG - Version 1, Release 1 http://iase.disa.mil/stigs/documents/u_good_for_enterprise_8.x_v1r1_stig.zip, 8/27/2014 IASE, AirWatch MDM Software 6.5 STIG Release Memo http://iase.disa.mil/stigs/documents/u_airwatch_mdm_v1_release_memo.pdf, 4/16/2014 IASE, Apple ios 9 ISCG - Ver 1, Rel 2 http://iasecontent.disa.mil/stigs/zip/jan2016/u_apple_ios_9_v1r2_iscg.zip, 1/22/2016 03

IASE, Microsoft Windows Phone 8.1 STIG Version 1, Release 2 http://iasecontent.disa.mil/stigs/zip/july2015/u_microsoft_windows_phone_8-1_ V1R2_STIG.zip, 7/24/2015 IASE, LG Android 5.0 ISCG Version 1, Release 2 http://iasecontent.disa.mil/stigs/zip/u_lg_android_5-x_v1r2_iscg.zip, 10/21/2015 IASE, Mobile Device Connections http://iasecontent.disa.mil/stigs/pdf/mobility_conections.pdf, 8/4/2015 IASE, Mobile Policy SRG - Version 1, Release 2 http://iase.disa.mil/stigs/documents/u_mobile_policy_v1r2_srg.zip, 7/24/2013 SPECIAL RESPONSE INSTRUCTIONS Responses not to exceed 10 pages. TO RESPOND TO THIS ENTERPRISE CHALLENGE 1. Download the Respond to an Enterprise Challenge pdf form, available on the Innovation Cell website 2. Complete the form then submit it via email to PEOEISInnovationCell@navy.mil