Some organizations spend a lot of time worrying about administrative (policies) and logical (application and system electronic) access controls without much concern for physical security. I don’t mean the kind of physical security where you make sure your data center is locked. I mean the kind of security which allows you to track who has your resources and ensures your organization takes the right steps to quickly mitigate impact.
For example, it doesn’t make much sense to lock the data center when unencrypted, unmanaged mobile devices travel across the country. The sensitive information stored safely in the data center might as well be in the lobby. This might seem a basic principle, but many organizations still don’t get it. Take the US Department of the Interior, for example. According to a report completed last month by the department’s inspector general, Western Region,
…13 computers were missing and… nearly 20 percent of more than 2,500 computers sampled could not be specifically located. Compounded by the Department’s lack of computer accountability, its absence of encryption requirements leaves the Department vulnerable to sensitive and personally identifiable information being lost, stolen, or misused.
Source: Evaluation of the Department of the Interior’s Accountability of Desktop and Laptop Computers and their Sensitive Data, U.S. Department of the Interior, Office of the Inspector General, 24 April 2009.
So the IG could verify the loss of 13 unencrypted computers, but about 500 were simply unaccounted for. The reason? Several of the agencies within the department had no process to track computer inventory. The following is from a related InternetWorld article:
Despite policies mandated by the Federal Information Systems Management Act and other regulations, including rules that say computers should not be left unattended in plain view and that organizations should establish policies to protect their systems from unauthorized access, the Department of the Interior doesn’t require that any hardware that costs less than $5,000 — that would cover most PCs — be tracked in an asset management system, and the current tracking system doesn’t have proper backing, according to the report.
Source: Department Of The Interior Can’t Locate Many PCs, J. Nicholas Hoover, InformationWeek, 27 April 2009
Most of us agree that encryption is a necessary part of any mobile device security strategy. But why worry about tracking laptops? Isn’t encryption enough to render the data on a lost or stolen laptop inaccessible? Well, it depends.
Many organizations do not use strong passwords. The reasons vary, including:
- Users tend to write complex passwords down, leaving then easily accessible
- Password reset calls constitute a high percentage of help desk calls, rising exponentially as password complexity increases
In other words, strong passwords are often seen as weaker and more costly to the business than simple passwords. And password complexity tends to remain the same when an organization implements full disk encryption, raising concern about the real effectiveness of scrambling sensitive information. The complexity of the password and the configuration of the login policy (i.e., history, failed login attempt, etc.) are factors in the strength of any encryption solution. In any case, encryption solutions should be supplemented to some degree—depending on the organization—by a mobile device physical management process, including,
- Mobile device assignment process which includes recording employee name and date of assignation
- Clearly documented mobile device usage and protection policy signed by each employee before he or she receives a mobile device
- Periodic, random verification that the assigned user still has physical control of the device
- Strict employee termination process which includes receipt of assigned devices
- Documented device end-of-life process, including
- recording receipt of device
- recording of device disposition, in accordance with the organization’s media sanitation and reuse policy
- Tested and documented device loss process, including
- process for reporting a mobile device lost or stolen
- assessment of the probability of sensitive data breach and notification of affected individuals