KNOX Product Overview v1 32 Public 4
KNOX Product Overview v1 32 Public 4
KNOX Product Overview v1 32 Public 4
Enterprise Edition
Published: Oct 31, 2013 Version: 1.32
11/21/2013
2
2
8% 6% 34%
52%
60%
9% 11% 20%
11/21/2013
11/21/2013
What is KNOX?
11/21/2013
11/21/2013
OS Hardening
Trusted Boot ensures boot-time integrity by ensuring that all boot loaders and the kernel image are from an authorized source; e.g. Samsung. TIMA monitors the running kernel for any evidence of tampering. Security Enhancements for Android (SE for Android) protects the system from malicious applications
11/21/2013
OS Hardening
Trusted Boot ensures boot-time integrity by ensuring that all boot loaders and the kernel image are from an authorized source; e.g. Samsung. TIMA monitors the running kernel for any evidence of tampering. Security Enhancements for Android (SE for Android) protects the system from malicious applications
11/21/2013
OS Hardening
Trusted Boot ensures boot-time integrity by ensuring that all boot loaders and the kernel image are from an authorized source; e.g. Samsung. TIMA monitors the running kernel for any evidence of tampering. Security Enhancements for Android (SE for Android) protects the system from malicious applications
11/21/2013
10
ARM TrustZone
11/21/2013
11
SE for ANDROID
ANDROID KERNEL
Some carriers*
Verification
?
Each boot loader verifies the next boot loader in the chain by authenticating its signature using a Public Key Infrastructure (PKI)-based certificate chain. The Root-of-Trust is a Samsung certificate that is verified by the hardware. However, on most Android devices, the Android Boot Loader does not verify the authenticity of the kernel it is loading
Installation of hacked and custom kernels by employees can compromise information security.
11/21/2013
12
For government and military use, Samsung KNOX allows the rootof-trust to be changed to a government issued or approved certificate, rather than using the default Samsung certificate.
This root-of-trust may be a US Department of Defense (DoD) issued (approved) certificate that enable deployments KNOX in government installations in the USA and NATO countries.
11/21/2013
13
TRUSTED BOOT
Secondar y Boot Loader 1 Secondar y Boot Loader 2 Android Boot Loader
SE for ANDROID
ANDROID KERNEL
Some carriers*
Verification
Measurements
Tr u s t Z o n e
KNOX implements a trusted boot sequence that extends to the Android kernel. - Measurements of the boot loaders and kernel are securely stored in TZ - Enterprise features are activated only if the boot process is verified
This ensures that enterprise security is not compromised if the bootloader and/or kernel are replaced by a hacked version.
11/21/2013
14
Furthermore, enterprise features continue to be disabled even if the user reverts back to the original Samsung KNOX kernel.
11/21/2013
15
11/21/2013
16
11/21/2013
17
However, rooting the device allows applications to run as the privileged root user with full access to all system resources. This privilege escalation flaw allows malicious applications to take control of the device.
11/21/2013
18
11/21/2013
19
TRUSTED BOOT
Se c onda r y Boot Loader 2 And r oid Boot Loader
SE f or AND R OID
AND R OID KERNEL
Some carriers*
Measurements
TrustZone
There is a clear need to ensure that the kernel itself is not compromised by exploiting an as yet unknown vulnerability. The TrustZone-based Integrity Measurement Architecture (TIMA) fulfills this requirement.
11/21/2013
20
TIMA
TIMA monitors the integrity of the kernel using two techniques:
Authenticating Linux kernel modules (LKM) as they are dynamically loaded. Periodic kernel measurement (PKM) is conducted by hashing kernel code pages and verifying the values against known defaults.
11/21/2013
21
TIMA Measurements
The following are some of the key features of TIMA:
11/21/2013
22
Why we need it ? -
11/21/2013
23
Enhanced security at the OS level provided by Secure Boot/Trusted Boot, TIMA and SE for Android protect against malware attacks and hacking.
11/21/2013
24
Application Security
11/21/2013
25
Application Security
KNOX provides a multi-faceted application security approach by providing.
Protection of applications from malware attacks and data leakage, Security for data in-transit (DIT), Encryption for data at-rest (DAR), Support for Smart card authentication
11/21/2013
26
11/21/2013
27
Personal Environment
11/21/2013
28
Psuedo-Sandbox
Applications running inside a container cannot interact with applications outside the container. Similarly, applications running outside a container cannot interact with applications inside a container.
11/21/2013
29
Feature-rich management.
Protection against malicious apps. Liability concerns mitigated by Containerization.
In BYOD mobility models, the Container feature confines enterprise management functions to the business environment.
11/21/2013 Samsung 2013. All rights reserved. 30
Using the KNOX Container allows IT to enforce strong controls on business use and relax controls for personal use.
11/21/2013
31
Hackers can even root a temporarily misplaced device and install malware that steals data.
11/21/2013
32
The key used for encryption is derived from the user-supplied password or passcode.
Full device encryption may be activated by the user, or remotely by the IT admin as a policy setting.
11/21/2013
33
11/21/2013
34
KNOX provides a comprehensive IPSec-based VPN solution for the most demanding enterprise requirements:
Connectivity Flexibility Full device VPN with split-tunnel mode Per-app VPN for BYOD/COPE deployments Up to 5 simultaneous VPN connections Multiple admin support Automatic tunnel re-establishment FIPS-mode configurable by MDM CAC support for US Govt. applications NSA Suite B algorithms X.509 support with OCSP-based certificate checking Cisco, Juniper, strongSwan Checkpoint, RSA token support
11/21/2013
35
Per-app VPN
The Per-app VPN feature enables IT admins to selectively enforce secure VPN connectivity only for enterprise apps, including web-based (SaaS) apps.
Eliminates personal applications congesting enterprise VPN resources. Protects consumer privacy by not sending personal application data via the enterprise network.
11/21/2013
36
The browser, email and VPN clients use credentials on the CAC card if configured by the IT admin. -
Authentication
Signing
Encryption
Other applications may also utilize the CAC card via well-defined PKCS 11 APIs
KNOX also support two-factor authentication for the device lock screen using the CAC.
11/21/2013
37
11/21/2013
38
11/21/2013
39
500
KNOX Policies
400
300
200
SAFE Policies
100
MDM 1.0
MDM 2.0
MDM 3.0
MDM 4.0
11/21/2013
40
IT Policy Support
KNOX offers a rich set of policies that enable comprehensive management of the device and/or the container.
KNOX introduces new policies primarily in the areas of security and enterprise integration.
Accounts Browser Email SSO Attestation Applications Firewall Password License Mgmt. Restrictions Container Integrity Mgmt. VPN Integrity Result Audit
11/21/2013
41
11/21/2013
42
Theft Recovery
11/21/2013
43
Entering passwords repeatedly is cumbersome and negatively affects the user experience.
Password sprawl can cause Helpdesk issues related to password resets. Caching passwords in apps is not safe.
11/21/2013
44
SSO
SSO enables authentication with a single account to quickly access a broad range of enterprise services.
Employees get a single destination and one-click access to all of their work applications. Eliminates the need for users to remember multiple passwords or create weak, easyto-remember passwords that dont meet corporate password policies.
Samsung KNOX platform includes SSO support for apps within a Container
11/21/2013
45
11/21/2013
46
Allows customers to use Active Directory to manage Containers, Samsung devices, and offer policybased access to mobile applications.
App Store
The App Store in the KNOX Container is preloaded with a variety of business apps from Independent Software Vendors (ISVs) such as Salesforce, Dropbox, etc. The app and associated data is secured within the business persona.
11/21/2013
48
App Store
A rich set of business applications are available in the App Store
BOX
11/21/2013
49
MDM/Reseller representatives and IT Admins can perform automated App Wrapping on behalf of enterprise customers using Samsungs cloudbased app wrapping service.
The service Containerizes the app and reassembles the Android Package (APK file), without changing the functional intent of the code. After an app has been wrapped, it undergoes basic QA testing.
If the testing is successful, the wrapped app can be added to the enterprise app store and made available for download.
If an error is detected during the QA process, the service supplies the details so the app can be modified and resubmit for wrapping.
11/21/2013
50
An unfortunate consequence of the rapid growth of smartphones is the equally rapid rise in the theft of mobile devices.
Samsung KNOX includes a builtin anti-theft solution and an associated subscription service that provides both tracking and recovery in the event a device is stolen. The solution consists of two components: the embedded Persistence Service that resides in the device firmware, and the Mobile Agent installed in the Android OS.
The Persistence Service is dormant until the user subscribes to the theft recovery service and installs the Mobile Agent Once the service has been activated, any malicious attempts made to remove the Mobile Agent (by accident or on purpose) will automatically invoke a restoral operation A process will be initiated for the Agent to self-heal and automatically reinstall itself onto the device
11/21/2013
51
Theft Recovery personnel can transmit commands to the Mobile Agent to activate monitoring and tracking and coordinates with law enforcement to recover the device.
11/21/2013 Samsung 2013. All rights reserved. 52
11/21/2013
53
KNOX MDM policies enable IT administrators to better manage devices and offer improved support by being able to remotely configure various features.
Enterprise features include AD-based management, SSO, Integrity Management, App Store, and Theft Recovery.
11/21/2013
54
Additional resources
For additional Samsung KNOX information:
Samsung KNOX Web Portal Samsung KNOX Support (FAQs, etc.) Samsung KNOX Flash Simulator Samsung KNOX White Paper
For additional Samsung Galaxy S4 information: Samsung Galaxy S4 Flash Simulator Samsung Galaxy S4 User Manual Manuals and Troubleshooting Guide
11/21/2013
55
Notice: All functionality, features, specifications, and other product information provided in this document including, but not limited to, the benefits, design, pricing, components, performance, availability, and capabilities of the product are subject to change without notice or obligation. Samsung reserves the right to make changes to this document and the product described herein, at anytime, without obligation on Samsung to provide notification of such change.
11/21/2013 Samsung 2013. All rights reserved. 56