Top security challenges and how to overcome them: Budgetary constraints + demonstrating ROI

Month: May 2023

Author: May 30, 2023 by Jesus Vigo

Source: https://www.jamf.com/blog/overcome-budgetary-constraints-demonstrate-roi/

Welcome to this blog series which highlights the top security challenges organizations are facing and discusses how to overcome them. In this series of five articles, each will target a specific challenge while providing guidance on how to find the method(s) that work for you while meeting your organization’s unique needs to rise above each of the challenges.

Given each organization’s differing needs, requirements, budgetary constraints and regional location, consider the guidance provided here to be less prescriptive (i.e., you need to do this), instead, look at it as listing out the potential options available – alongside their respective strengths and weaknesses – allowing organizations and the administrative teams that support them to develop the security strategy that works best for them while still addressing the threats, attacks and concerns of the modern threat landscape that most impact their business operations, processes, users and of course, data.

In the previous blog, we discussed the challenges organizations face when it comes to preparing for and addressing cybersecurity threats from outside the organization.

In this final entry, we focus on how budgetary constraints can limit cyber security protections of critical business data and the difficulty IT faces in properly capturing return on investment (ROI) data pertaining to security-based expenditures in various categories, such as:

  • Vendor consolidation
  • Automation
  • Business plan promo
  • Device and app lifecycle

Before we delve in, let’s set the stage for what we’re about to discuss by explaining a bit about both budgetary constraints and a simple take on how ROI is measured before explaining how applying these traditional metrics to cybersecurity spending often yields incorrect assessments for both.

Budgeting 101

Security can be costly. This is perhaps one of the greatest understatements in any industry. Why do we say that? It’s both simple math and difficult-to-predict calculations based on real-world, upfront costs (former) and trying to foretell the extent of the damage to an organization should they fall victim to an attack.

In other words, it’s one part math, one part soothsayer to a degree.

One dollar = one dollar

This section concerns itself exclusively with the math portion. Here, the cost of security controls, such as MDM licenses to be able to manage devices, endpoint security software to fend off malware and securely connecting user devices to company resources with cloud-based identity credentials is a straightforward process.

By performing simple arithmetic, we add one license each of Jamf Pro + Jamf Protect + Jamf Connect to determine the cost upfront cost of protecting one device with Trusted Access. From here, you merely multiply the cost of the licenses by the number of devices your organization wishes to manage and you have your total. See? We said it was simple.

One dollar ≠ one dollar

Here’s where budgeting becomes less clear. Because more goes into determining an organization’s overall security spend, other types of security controls may be required to meet the unique needs of your organization. As a matter of fact, the recommended way to truly determine the levels of risk that your organization’s infrastructure is faced with is to perform a risk assessment of each piece of critical equipment, data, and device.

In doing so, you will not only identify the types of risk facing your organization but also understand the severity of each risk type, as well as determine the criticality of the affected resource. Ultimately, these elements paint the picture of risk as it affects the organization, allowing them to determine which controls are needed to best strengthen their security posture in accordance with their risk appetite.

ROI 101

Security can be costly. We repeat this here for added emphasis because accurately determining an organization’s ROI requires more than being able to identify a specific number or target percentage that serves as dividends, or is “paid back” in return for procuring a specific security control or service.

Truth be told, there are several ways in which an organization may meet or exceed its ROI without ever truly quantifying the budget spent on security protections through traditional ROI models because, simply put, security isn’t really viewed through that lens until an incident occurs. It is only then that some organizations realize the true value in their spending to mitigate cyber security threats, like those that lead to data breaches, as a security return on investment.

How much does a security breach cost?

According to IBM’s Cost of a data breach 2022 report, the global average cost of a data breach is $4.35 million. For organizations based in the U.S., that number more than doubles to $9.44 million. Oh, and if your organization happens to be in the healthcare industry, that number grows to $10.10 million.

Are there other factors that can add to the cost?

In a word: Yes.

These factors are viewed as exceptions and not the rule, meaning organizations should view these more like variables that could affect them (but may not). Because of this, these potentialities are not factored into the costs above in IBM’s report. Despite this fact, the variables have the potential to cause the costs of attacks and data breaches to balloon. Some examples of these are:

  • Regulatory compliance violations: Organizations may be subject to fines, including civil and/or criminal liability if found to be in violation of regulatory governance due to a failure to secure protected data.
  • Leaking of proprietary data/IP: Any data leaked can create additional risk factors for an organization. Leaking of proprietary data or IP can compound costs in several ways that impact business operations, like affecting revenue streams.
  • Loss of business reputation: The fallout that stems from the loss of reputation in the eyes of the public can also have a negative impact on organizational revenue. In certain cases, the combined losses have been so staggering that the business is unable to recover.

Security return on investment

While organizations would do well to reframe how they view security budgets and calculate ROI on their spending, there are some things that can be done to ensure that each dollar spent is efficiently put to best use. Below we’ve highlighted some of the more common categories where streamlining meets efficacy to build a stronger security posture.

Vendor consolidation

Some solutions make a big splash over the term “a single pane of glass”. Though in theory being able to access all of your tooling from a central location seems beneficial, it comes with a caveat that doesn’t often reveal itself until after your organization has migrated – not all features, operating systems or devices may be fully supported.

Consolidating vendors and security solutions certainly has a place in reducing budgetary concerns while providing IT and Security teams a streamlined means of performing management and security-related tasks. But if the trade-off to simplifying management means that some security protections will be delayed in being supported or may never be fully supported, well, the time saved on the device management side will result in increased risk on the security side – and that result in a costly trade-off long term.

Put another way, device management and security are best viewed as two halves of the whole. In order to holistically protect endpoints, management workflows must be able to allow administrators to effectively manage their devices, including up-to-date patch management and applying configuration profiles to harden surfaces to name a few critical processes in the lifecycle.

Similarly, ensuring devices are managed according to industry best practices is great, but without visibility into device health status and being able to determine when endpoints have fallen out of compliance, then the workflows designed to remediate incidents won’t know how to enforce compliance, leaving an attack vector open to exploit.

It is critical for organizations to realize that no true “silver bullet” solution exists, hence why partnerships are critical to the success of your security strategy. But if having too many partners is financially untenable, having too few may open the organization to risk due to lack of support.

The solution? Partner with best-of-breed solutions for the platform you need to fully support. For Apple devices, Jamf is purpose-built to provide full support of macOS, iOS, iPadOS and tvOS devices and features – all with same-day support – providing organizations the peace of mind that devices are completely protected, but that said protections can be deployed on your time-table, not anyone else’s.

Automation

The “grail” of administrators everywhere! Automation exemplifies the crux of my long-held mantra to “work smarter – not harder.” The belief, when put into action properly, allows admins to not only do more with less but, as I like to look at it, spend less while receiving more. And who doesn’t like the concept of getting more for less?

Let me explain. IT and Security usually operate as separate teams with their respective responsibilities, however, they can and do work together to keep resources safe from threats. Consider the scenario of an organization that has adopted the BYOD model with a dozen users utilizing their personally owned devices for work. The users are part of a distributed workforce working remotely. As part of the IT/Security team, it’s one of your roles to ensure that each device is patched and that users manually enable legacy VPN each time they connect over untrusted wireless networks.

Though twelve devices don’t appear to pose significant difficulty to manage, the disparate distances between you, the admin, and each of the users you support globally make the task overwhelmingly challenging to maintain manually. So challenging that it borders on impossible, as there’s no scientifically possible way for you to monitor each user personally at the same time.

However, adopting MDM and Zero Trust Network Access (ZTNA) solutions will allow them to perform the heavy lifting as it pertains to monitoring device health in real-time while integrating both solutions enables automated workflows that execute policies to remedy compliance issues when triggered. In this example, the admin can easily deploy software updates in bulk to keep devices up-to-date. While replacing legacy VPN with modern ZTNA technology enables policy-based management to enforce secured network connections every time a user requests to access business resources by automatically routing protected resources through an encrypted micro-tunnel – even if the user forgets to enable it manually.

The time saved by the administrator permits them to turn the focus toward other, more critical issuesthat may be better served by their direct attention, thereby spending less (effort) but receiving more (time).

Device and app lifecycle

Another critical aspect that ties directly to the organizational budget is the device and app lifecycles. Particularly, how the deployment of new devices works hand-in-glove with the ongoing management of endpoints and the apps utilized by users to remain productive has a direct impact on the device and overall security posture of an organization.

In the example above, the lone administrator is tasked with keeping devices patched while ensuring that requests to access protected business resources occur only over secure remote connections. Let’s take a moment to rewind this back a bit and say that the organization has decided to standardize using Mac as their preferred platform. They have procured MacBook Pro laptops and had them shipped to each user’s home. In prior times, IT would’ve needed to have received the laptops first to configure them, then ship them out to each remote user or simply traveled to each location to manually and physically configure each device.

But that is far too costly, isn’t it? Indeed it is – both in money and time. The far better, far more efficient and secure method of provisioning devices is zero-touch deployment. Utilizing Apple as a solid foundation, organizations can take advantage of Apple Business Manager (ABM) or Apple School Manager (ASM) for educational institutions to set the initial configurations for each device, ensuring a smooth, secure handoff to the MDM for enrollment. From there, the MDM performs the configuration of the Mac, including installing software and configuring security settings, as well as provisioning cloud-based credentials so that the device is ready for the end-user within minutes of them powering it on.

A summary of the zero-touch device deployment process is as follows:

  1. Open the box
  2. Power on the device
  3. There is no step 3

With device provisioning being fully automated and deployment performed by the end-user themselves, MacAdmins’ time is freed to manage apps and updates, right? Wrong…these can and should be automated as well to keep your hands free and your users happy.

Leveraging the tie-in with ABM/ASM and your MDM solution, procurement and deployment of applications is made simple, thanks to its direct connection to the Apple App Stores. Managed apps, or those that are deployed by the organization are easy to configure and even easier to install on devices enrolled in your MDM. Since these apps are centrally hosted by Apple, as new versions as released, they are already queued for update across your device fleet – no further action is required by administrators.

Jamf users have an ace up their sleeve, in that our App Installers provide the same functionality as first-party apps, except extend this feature to third-party applications to streamline deploying these packages, sourced from the vendors themselves and managed by Jamf.

While first- and third-party app deployment and updates can be automated, the Jamf Self Service catalog offers additional flexibility to empower end-users to take greater autonomy when it comes to managing their devices. With Self Service, Jamf administrators can pre-authorize apps, packages, settings and configurations for all stakeholders, allowing them to obtain the software they need, exactly when they need it. No help desk tickets and IT requests for approval are necessary – just download what you need from a safe, secure and customized repository and proceed without worrying about the security of the files or the integrity of the installer packages.

Cutting down on help desk requests + streamlining the deployment of both hardware and software + empowering end-users to remain productive from anywhere, at any time and over any connection = IT/Security teams that are free to focus on providing better service and greater security without the burden of having to manually touch or be physically present when performing common tasks.

“Si Vis Pacem, Para Bellum”

The phrase, translated from Latin means, “If you want peace, prepare for war”. Has been adapted throughout history but was originally written in the fourth or fifth century AD by Publius Flavius Vegetius Renatu in his tract De Re Militari.

It conveys the insight that in order for peace to be preserved, there are often necessary conditions that ensure it remains. In this context, as it applies to cybersecurity, the ability to defend your devices, users and data from threat actors is the required condition.

Despite the difficulty in quantifying ROI through traditional models, it is perhaps better framed through the lens of other necessities that provide preventive care though we may hardly if ever really utilize it.

As an example of this, I’d like to draw your attention to insurance policies. It is not only important but in most cases a legal requirement to obtain insurance to protect homes, cars and even our health. We pay premiums, often monthly, in exchange for the possibility that if something occurs to any of the named insured, the insurance company will step in and cover a percentage of the financial loss incurred through misfortune. Some go through entire lifetimes paying for car insurance without ever once needing to file a claim. And while there are those that may deem this an unnecessary expense, there are those of us who – especially having been through the scary and unfortunate scenario of a car accident – are certainly grateful that the insurance coverage we’ve been paying for will ease the burden during a decidedly difficult time.

The same applies to security controls implemented to protect resources. They’re not budgeted, procured and configured to realize some financial gain or specific ROI target – it’s done so to mitigate risk, or at least minimize the fallout from this risk. Cybersecurity often doesn’t provide these metrics in ways that business operations can clearly denote. On the surface, they may only see that their security spending accounts for X dollars and the ROI accounts for Y, which is reducing revenue by X amount.

But what about when a security incident occurs?

This is the great equalizer. Not that anyone should ever want to become a victim of a security breach or even an attempted attack, but it does put the security budget into perspective much like the insurance premium example above did.

If your organization spends X on security controls and the ROI accounts for Y, the revenue is reduced by X amount in traditional models. However, IT and Security teams are able to gain insight into device health and can generate reports from telemetry data that detail which devices are protected and when, as well as when attacks have occurred and what they attempted to gain access to – both what was compromised and prevented.

With this information in hand, organizations have the data necessary to determine how many attacks were attempted and effectively stopped. Combined with a current risk assessment, a clear understanding of how many attacks were stopped, translating into revenue that was saved from being used to:

  • recover from data breaches
  • remediate endpoints that were compromised
  • contract emergency IT/Security team support
  • pay for regulatory fines
  • cover legal costs related to civil/criminal liability
  • provide services for victims of leaked PII
  • procure cybersecurity controls to mitigate current/future attacks

Armed with this information, organizations can now calculate ROI more accurately, by being able to account for existing and additional risks related to the organization’s security posture and added costs related to each threat that was protected against. When considering the numbers at the top of this document from IBM’s cost of a data breach report, the ROI may seem inconsequential when compared to the average $9.44 million cost per breach. Furthermore, when factoring the average cost plus any other additional liability costs stemming from a breach – including loss of reputation – well, it really puts concerns over security budgeting into perspective. Dare I say, giving cyber security its rightful seat at the business table, wouldn’t you agree?

Struggling to justify security budgets while driving ROI? It’s more than just dollars and cents.

Take a detailed look at cost, time and resource savings with a proven Apple Trusted Access solution.


Top security challenges and how to overcome them: Prepare for & address external threats

Month: May 2023

Author: May 26, 2023 by Jesus Vigo

Source: https://www.jamf.com/blog/overcome-prepare-address-threats-outside-the-organization/

Welcome to this blog series which highlights the top security challenges organizations are facing and discusses how to overcome them. In this series of five articles, each will target a specific challenge while providing guidance on how to find the method(s) that work for you while meeting your organization’s unique needs to rise above each of the challenges.

Given each organization’s differing needs, requirements, budgetary constraints and regional location, consider the guidance provided here to be less prescriptive (i.e., you need to do this), instead, look at it as listing out the potential options available – alongside their respective strengths and weaknesses – allowing organizations and the administrative teams that support them to develop the security strategy that works best for them while still addressing the threats, attacks and concerns of the modern threat landscape that most impact their business operations, processes, users and of course, data.

In the previous blog, we discussed the challenges presented by unanticipated business risks as it pertains to cybersecurity threats, like hacking groups, high-profile targets and the role of insider threats to name a few. In our fourth entry, we turn our attention to the preparation for and addressing of cybersecurity threats stemming from outside the organization, such as:

  • Targeted attacks from nation-states
  • User introduced risk from using personal devices
  • Non-sanctioned software and service use at work
  • Undiscovered threats within the infrastructure

Let’s get right down to it, shall we?

Nation-states

Government surveillance of citizens. Oppressive control. “Big Brother.” Depending on where in the world you call home, any one of these euphemisms could fit the description of a nation-state or sponsored threats. This does not imply in any way that surveillance et all., particularly that which serves the greater purpose of keeping watch over civilians in public areas, like highways, shopping malls and public transit stops, is one step beyond abuse of power. No, it is merely to identify that not all governments are designed with the same set of principles and that extends to its views on its people.

Because differing agendas often lead to different outcomes when viewed through the lens of protecting a country’s sovereignty, the same tactics that are employed worldwide naturally extend to the digital domain with tactics, like espionage, sabotage and even full-scale wars being carried out over the cyber landscape (more on this later).

Who is at risk from nation-state attacks?

Simply stated: any person can be the target of a nation-state-backed attack. Given the vast resources, including access to communications and equipment, and the best threat actors, nation-state attacks pose a significant threat to organizations as well, regardless if they have ties to a government or are merely private entities performing their business operations.

What is their aim?

These types of attacks typically have a series of different vectors which they target, but ultimately they center around a few main goals:

  • Disrupt or sabotage operations/infrastructure
  • Disseminate misinformation or modify information
  • Obtain critical information, such as confidential and sensitive data
  • Prevent “whistleblowers” from speaking out against them

What are the common targets for nation-state attacks?

While anyone or an organization can fall into the crosshairs of a nation-state or sponsored attacks, typically, the motivation behind the attacks falls in line with a country’s agenda. Among these targets, the following are among the most common:

  • Any person deemed a national threat, such as dissidents, journalists and groups that actively speak out against the country or bring to light unfair practices
  • Critical infrastructures, like utility companies, financial institutions, communications and healthcare organizations
  • Military targets, including weapons systems, informational databases and intelligence, such as plans, movements and locations
  • Political campaigns, vote tampering or election interference and public- and private-facing government websites

How can enterprises best protect themselves and their users from nation-state attacks?

It is important to not underestimate nation-state attacks. First and foremost, like most cyber threats, they can exploit risk to achieve their means and once an attack vector is found, the attack can lead to a data breach in a relatively short amount of time. However, unlike other cyber threats or attacks of opportunity, nation-state attacks are often very well-funded and well-prepared, with access to powerful tooling to carry out sophisticated attacks. Furthermore, while motivation is a central theme, it isn’t necessarily required, as nation-states have historically been known to conduct cyberattacks without a clear mission, but rather remain very patient, taking their time to gather reconnaissance and only then planning their attacks accordingly – even if it takes years to complete.

Bearing that in mind, IT and Security teams should be aware that there is no silver bullet or “one-size-fits-all” solution that will mitigate any threat, less still a carefully planned one.

In fact, the best resource in your arsenal is to minimize the risk of falling victim to nation-state threats. Institute a strong, layered defense strategy that fortifies your security posture and that of the devices connecting to and accessing organizational resources. For example:

Bring Your Own Device (BYOD)

BYOD programs have existed for quite some time now. In fact, the introduction of the iPhone in 2007 is truly what kickstarted the explosive growth of the modern smartphone, leading to its widespread adoption by users for both personal and business usage.

As usage continued to spike, more and more users adopted mobile devices since their flexibility, ease of use and efficient performance compared to larger, more cumbersome mobile computers. The latter was also heavier and required more frequent charging to keep the device from powering off after a few hours of steady use. Not to mention the age-old problem of supporting multiple operating systems across multiple device types, which certainly added to IT and Security teams’ workload as they tried to keep devices and the company network secured.

The solution to the challenges of supporting mobile devices while maintaining your security posture? Mobile Device Management (MDM).

MDM, coupled with support from Apple through its security frameworks, really accelerated the management of mobile devices but also kicked it into lightspeed by designing a framework that supports security and user privacy from the ground up. Solutions like Jamf Pro fully support the groundwork established by Apple and extend it further, with support for all ownership models and same-day support that provides a solid foundation for IT to manage all macOS, iOS/iPadOS and tvOS devices that access enterprise networks in a safe, secure manner.

By extending management and security workflows to all devices, regardless of whether they are personally- or company-owned, organizations simultaneously limit risk introduced from devices that are:

  • Misconfigured or not configured at all
  • Missing the latest security updates
  • Lacking necessary apps and updates
  • Not recoverable or data can be wiped if lost or stolen
  • Non-compliant by utilizing unsanctioned apps/services (Shadow IT)
  • Processing and storing data in unsecured volumes
  • Communicating over untrusted networks without encryption
  • Leaving data unencrypted due to not using passcodes
  • Not monitored nor reporting back crucial device health data in real-time
  • Unmanageable by IT/Security, leaving them unable to effectively mitigate incidents

The list above is far from exhaustive when it comes to securing your devices at work. That said, some of the ways in which organizations can utilize MDM to ensure a smooth transition to user’s personal devices – while keeping business resources secure – are as follows:

  • User-initiated enrollment allows end-users to receive enterprise-wide security for business resources in a separate, secure volume leaving user privacy and personal data intact
  • Lockdown settings on devices, like installing configuration profiles for securing connectivity to wireless networks and business resources
  • Ensure devices are kept up-to-date with system and security updates to patch vulnerabilities
  • Deploy supported, pre-configured apps so data stays secure as users remain productive
  • Enforce compliance with company and regulatory governances through policy-based management
  • Implement managed Apple IDs for business use and a separate consumer Apple ID for personal use, including cloud-based backup of data and settings
  • Enable features and functions for enhanced security, like requiring passcodes and volume encryption
  • Leverage the Self Service catalog of pre-approved business apps to empower users while deploying required services, like ZTNA for secure remote access to business resources
  • Integrate MDM and Endpoint Security solutions to monitor device health in real-time and allow for automated remediation workflows
  • Actively prevent threats, both on-device and in-network, ensuring devices are protected at all times

Shadow IT

In the previous section, we talked about BYOD challenges. And while it sometimes gets lumped in with Shadow IT, the truth of the matter is that – when done properly – sanctioned BYOD programs serve as one mitigation solution to the threat of Shadow IT. That said, Shadow IT threats are made up of more than just using unsupported devices for work. Falling under that umbrella are also utilizing unsanctioned apps and services that have not been vetted by IT and Security teams when accessing, processing, storing or transmitting company data.

While not inherently malicious in nature, Shadow IT began to take shape when end-users, often frustrated by the inaccessibility or lack of user-friendliness behind official, company-authorized apps and services gave way to users relying on better hardware and easier, more efficient software to stay productive in ways that add value to the work instead of subtract from it.

As with most things in the security space, a tool is just a tool. What defines whether it is malicious or not is the intent of the user operating it. Unlike other tools though, in the cybersecurity realm, intent is not the only component to the risk element. There’s also whether the user knowingly or unknowingly introduced risk that is often paired with intent.

However, it is beyond the scope of this blog to determine malicious intent or not, but rather to identify the risk factors posed by Shadow IT and, more importantly, how to mitigate them effectively to fortify your organization’s security posture against data breaches.

After all, that is the $3.08 to $5.02 million question, according to IBM’s 2022 Cost of Breach reportwhich concluded that“adversaries took advantage of configuration errors and any vulnerabilities within apps, many of which were undetected due to employees using unsanctioned services.

How can businesses protect what they’re not aware of?

By embracing Shadow IT, that’s how.

Let’s clarify, this doesn’t mean allowing end-users to use any and all hardware and software tools without oversight. It also doesn’t mean rolling it back to the late-90s and 2000s by adopting an “iron-fisted” approach to managing IT. No, it simply means leveraging modern security tooling, practices and procedures that are more flexible while still protecting business resources from unauthorized access and data usage.

How do keep assets safeguarded from Shadow IT threats?

The first step is to understand the why behind users turning to Shadow IT, what resources are being used and why they present a better solution than what the organization provides. Armed with this information, the company can better understand which risk(s) are introduced by Shadow IT and finally arrive at the answer to the question initially asked: how to best keep assets safeguarded.

Ok, so now that I know what needs protecting and why, how do I actually go about doing it?

Part of the suggestion to embrace Shadow IT above means having a clear understanding that merely telling end-users that they cannot use a particular device, app or service simply won’t do. When it comes to data security, don’t just take someone’s word for it, you want to be able to verify and enforce that protections are in place and actively mitigating threats.

This can be achieved by employing a multi-layered strategy to effectively keep resources protected while enabling the flexibility of choice that users may be asking for (or even need) to be their most productive.

  • Implement employee choice or sanctioned BYOD programs that empower employees to work with the technologies that they feel most comfortable with while allowing devices to be properly configured by the company’s MDM solution for greater visibility and security.
  • Align Shadow IT with organizational standards and protocols, such as deploying endpoint security technologies that integrate with management and identity to holistically protect devices, users and data.
  • Evolve security protections. For example, adopting a Zero Trust Network Access (ZTNA) solution to secure business resources from unauthorized access and compromised devices by verifying user credentials and endpoint health status each time access requests are made and before they’re granted to minimize exposure and data leakage.
  • Develop hardware/software requirements for accessing protected business resources, requiring devices to meet these standards, like encryption enabled for in-device storage and on networks.
  • Streamline operations, prioritize IT assets that provide the greatest benefit for endpoint, user and data security, as well as adapt to the needs of distributed workforces while reducing costs by eliminating resources that are no longer compatible and are underperfomant.

Threat hunting

Endpoint protection is a “no-brainer”, am I right? When it comes to endpoint security, one of the threats that sit top-of-mind is arguably malware. Malicious code in its myriad forms remains one of the key threats to cybersecurity. And while endpoint protection provides an excellent layer of security against known threat types, the behavioral analytics used by many of these solutions protect devices by preventing known threats based on their signature values.

But that only tells a part of the story, doesn’t it? The other part lies hiding in the underbelly of your devices, buried under lines of code in applications installed within the OS – sometimes these unknown threats lay in wait, biding their time – gathering as much intel on your company’s operations as it possibly can, just waiting for the right time to strike.

Jonathan Raymond’s insightful quote perfectly encapsulates this sentiment: “You can’t know what you don’t know. You can’t know about things you have yet to discover.” But it is the second sentence that provides IT and Security teams a doorway towards satiating a fundamental curiosity, for it begs the question: what can be done to discover and, therefore, know more?

The answer to this question is threat hunting.

As touched upon earlier, not all threat actors behave the same. Their actions are as different as their targets. While some utilize their tools to hastily take advantage of a window of opportunity, others carefully construct plans to play the long game, surveilling targets for undetermined periods of time, stockpiling data and using it to inform the tooling to be used to strategically attack their victims at the most opportune moment – or should one not exist, they work steadily to create one.

Both are dangerous to a company’s security posture, but the latter represents a long-lasting threat that may linger for much longer than the duration of the attack. And while this may give IT and Security teams pause, it also presents them with an opportunity of their own: to stop attacks before they have a chance to grow into something far worse, like a data breach.

The aim of threat hunting is for the hunter to become the hunted. In other words, the threats that have invaded enterprise devices are to be sought out and eliminated by a team of IT and Security professionals dedicating time and resources to gather, collate and analyze telemetry data to sus out any identifiable anomalies to the baselines to successfully hunt down and mitigate these hidden threats as part of a defense-in-depth security plan.

Teams dedicated to threat hunting can be any size and made up of professionals from all IT-related backgrounds. Though it’s not uncommon for team members to be experts in data science, programming or seasoned security staff, changes to cybersecurity tooling have made it so that even smaller teams without extensive experience or expertise can perform threat-hunting tasks to reduce the risk of unknown threats lurking around within your organization’s infrastructure.

After establishing your own threat-hunting team, some of the tasks they can perform to achieve their objective are:

  • Constant, real-time monitoring and device health status checks with up-to-date insight into endpoint health
  • Leverage advanced machine learning (ML) and threat intelligence engines to aid teams in detecting and remediating threats by analyzing large, complex volumes of data
  • Stream endpoint logs to SIEM solution for granular reporting that provides centralized information on threats, risky apps and suspicious behaviors and system processes
  • Standardize device and network security postures by creating baselines. This ensures compliance by aligning them to security frameworks, such as those from MITRE ATT&CK, NIST and CIS
  • Blend analytical, situational and intelligence methodologies to achieve a mature level of consistency and scalability to adapt to current and future while increasing efficacy

Ensure the security of your Apple fleet against the external security threats of today and tomorrow.

Balance device, user and data security and privacy while mitigating risk factors with Apple and Jamf solutions.


5 things you need to know about BYOD security

Month: May 2023

Author: May 25, 2023 by Hannah Hamilton

Source: https://www.jamf.com/blog/5-things-you-need-to-know-about-byod-security/

Bring your own device (BYOD) programs are becoming more popular, with 83% of companies with a BYOD policy of some kind. It makes sense, after all, since 67% of employees are using their own devices for work purposes anyway.

But there are very real concerns about device and data security surrounding these programs—for instance, how can organizations be sure that employees are safely using their devices for work purposes? What if the device gets lost or stolen? What about user privacy? In this blog, we’ll touch on a few factors to keep in mind when considering a BYOD program.

BYOD devices require different security policies than company-owned devices.

BYOD devices aren’t restricted to business hours—or business purposes. This makes securing these devices more difficult, as organizations have to anticipate how a variety of users will use these devices that have access to corporate data. In order to protect company and personal data, it’s critical to:

  • Strictly enforce user authentication when accessing company resources
  • Allow users to self-enroll into a BYOD program
  • Clearly and regularly communicate expectations to employees
  • Provide secure connections to business applications
  • Enforce data and network security protections
  • Respect user privacy

The strategy here is to give the user seamless access to the tools they need to work while providing device security and user privacy. Implementing this can be a challenge; we won’t fully dive into that in this blog.

Related reading: Jamf BYOD: Alleviate Security and Privacy Concerns

You don’t have to sacrifice user privacy.

Apple devices have a clear distinction between personal and company data—Apple’s User Enrollment workflow creates separate personal and business partitions and keeps each partition isolated from the other. This results in user information being kept private from their company while company data is controlled in its partition.

IT has more control over user devices once they enroll, but that doesn’t mean they’re omnipotent. Here are some of the actions organizations can’t take on employees’ devices:

  • See personal information, usage data or logs
  • Access inventory of personal apps
  • Remove any personal data
  • Access device location
  • Remotely wipe the entire device
  • Take over management of a personal app

Related reading: Mobile BYOD with Jamf and Apple

ZTNA provides secure access to corporate apps.

Since BYOD mobile devices are…well, mobile, they have to securely connect to your company network regardless of their location or local network. In the past, this was largely done with VPN, but VPN gives a device holistic access to your network after the user authenticates once within the allotted session duration. Zero Trust Network Access (ZTNA) instead creates encrypted micro-tunnels to specific apps separately, requiring the user to verify their identity each time. ZTNA combined with a Self Service portal gives employees quick access to apps pre-approved by IT, reducing the prevalence of shadow IT. Not only does this ensure that only trusted users can access company apps, it also provides a seamless experience for users as they do their work.

Related reading: Zero Trust Network Access for Beginners

BYOD policies formalize what employees are already doing.

With more than two-thirds of employees already using their personal devices for work—regardless of their company’s BYOD policies—implementing a formal BYOD program can prevent security issues. By requiring employees to enroll into your MDM, you prevent unauthorized and uncontrolled access to corporate apps and data. If a device gets lost or stolen, it’s much simpler for IT to disallow that device to connect to company resources since it’s a known, enrolled device.

As mentioned above, BYOD Apple devices enrolled via User Enrollment into your MDM separate apps and data into personal and business partitions. This keeps personal information personal and business data contained in its own partition subject to the security policies set by your MDM. IT admins can also set corporate configurations like Wi-Fi, per-app VPN, mail and passcode requirements; and add or remove restrictions that protect corporate data. Additionally, data loss prevention policies prevent company data from ending up in non-managed apps.

In other words, implementing a BYOD policy lets employees keep doing what they’re already doing while giving IT transparency into the devices that access company resources.

Related reading: Account-driven User Enrollment + Service Discovery

User devices enrolled in your MDM are more secure.

Maybe you’re worried about having devices that aren’t fully owned and managed by IT on your network. Following from the previous section, let’s take a closer look into why BYOD devices are more secure once they’re enrolled into your MDM.

  • Endpoint protection detects vulnerable or dangerous apps
  • Regular security checks monitor for out-of-date or vulnerable OS versions
  • Corporate configurations prevent user misconfigurations when connecting to resources
  • Connections to corporate apps are encrypted via ZTNA

The powerful combination of more secure devices, encrypted connections to the company network, user convenience and IT transparency ultimately helps with overall security posture; users have seamless access to the tools they need, reducing shadow IT, while devices and their connections are kept at their most secure with minimal user intervention.

Related reading: Discover a better way to BYOD.

Ready to start your BYOD journey?


Can you use AI for IT scripting?

Month: May 2023

Author: May 23, 2023 by Laurie Mona

Source: https://www.jamf.com/blog/can-you-use-AI-for-IT-scripting/

There seem to be new headlines every day about exciting advances in Artificial Intelligence (AI), especially the possibilities of using advanced chatbot technology. This new generation of AI bots uses statistical models to generate complex text – including usable code.

So where does AI fit into the IT admin toolbox? One area worth exploring is IT scripting, a subject that benefits from the effective use of complex vocabulary and muscle memory.

In our webinar Exploring AI for IT Scripting, presenter William Smith, Jamf Partner Program Manager, investigates.

Check out the Exploring AI for IT Scripting webinar.

What is AI?

The first question Smith tackles is: what exactly is “Artificial Intelligence” anyway?

No matter what scary scenario Hollywood portrays, credible definitions of AI don’t say anything about computers achieving self-awareness or being alive.

The definition Smith likes best comes courtesy of Merriam-Webster: “The ability to deal with new or trying situations. The skilled use of reason.” To put it in even more practical terms, AI is about programming computers to problem-solve like humans.

Smith says the reason we’re seeing a proliferation of online AI tools right now is thanks to OpenAI.

What is OpenAI?

Smith uses one of the new online tools backed by OpenAI called ChatGPT to answer this very question.

The response: Open AI is a research lab exploring artificial intelligence and wants to ensure AI is developed so that it’s safe and beneficial for humanity. It’s exploring AI for language processing, machine learning and robotics. And they make tools that software developers can incorporate into their own projects.

Can OpenAI be used for scripting?

The presentation focuses on the question: can AI help administrators write useful shell scripts?

Smith provides a hands-on demonstration of attempts to write scripts using a website designed to help write macOS bash scripts linked to OpenAI’s API.

During his presentation, Smith asks and provides answers to three questions:

  • Can AI help administrators write useful shell scripts?
  • Can AI understand what I ask, or do I need to “speak AI”?
  • Where does AI work, and where does it fall down?

The verdict on using AI for scripting

Smith finds both positives and negatives from his trial run using the advanced chatbox technology for scripting.

Some of the points in favor of using AI include:

  • Simplification of answers by returning just one response.
  • Responses with single commands give concise, textbook examples.
  • OpenAI is multi-lingual and inclusive.

But potential issues include:

  • You must know the right question to get your answer.
  • The answer isn’t always right – in fact, it’s often wrong.
  • The more complex the question, the likelier the answer is wrong.
  • AI doesn’t know how to say, “I don’t know.”

For a deeper dive into the specifics of how AI can be used for shell scripting, check out Smith’s full presentation.

Find out more in the Exploring AI for IT Scripting webinar.


Using Freeform in the classroom with Jamf Teacher

Month: May 2023

Author: May 23, 2023 by Laurie Mona

Source: https://www.jamf.com/blog/using-freeform-in-the-classroom/

What is Apple Freeform?

Freeform is Apple’s newest tool that comes free on every iPhone, iPad, and Mac supporting iOS 16.2, iPadOS 16.2, or macOS Ventura 13.1.

An app designed for creative brainstorming and collaboration, Freeform helps users organize and visually lay out content on a flexible canvas, giving them the ability to see, share, and collaborate all in one place without worrying about layouts or page sizes.

Users can add a wide range of files and preview them inline without ever leaving the board. Designed for collaboration, Freeform also makes it easy to invite others to work together on a board. Because Freeform boards are stored in iCloud, users can stay in sync across devices.

How to use Apple Freeform

Freeform provides a virtual whiteboard to gather ideas in one place. As content is added to the board, the infinite canvas expands, offering the flexibility to work with many files and to collaborate with others.

The app offers a variety of brush styles and color options to sketch ideas, add comments, and draw diagrams. iPhone and iPad users can draw anywhere on the canvas with their finger, and it also supports Apple Pencil so users can sketch ideas.

Freeform supports a wide range of files, including photos, video, audio, documents, PDFs, links to websites and map location links, sticky notes, shapes, diagrams, and more. iPhone and iPad cameras can even be used to insert an image or scanned doc directly into the board. With a full shapes library, Freeform gives users over 700 options to choose from, allowing users to change the color and size, add text, and even create personalized shapes.

Users can drag and drop content onto the board from other apps including Files and Finder, and built-in alignment guides simplify board organization. With Quick Look, users can preview content with a double tap without ever leaving the board, and multiple video files can play at the same time to create a dynamic view. Content like images and PDFs can be locked into place on a board, and collaborators can then annotate on top of or around the object.

How to use Freeform in the Classroom

With the ability to work with up to 100 collaborators in the same board, Freeform can provide a shared space for creativity when working on group projects.

For schools, this enables teachers to create projects with collaborative student input using simple tools students may already be familiar with, or that are intuitively easy to learn.

More positives: there’s no cost barrier to use like with some other apps. The limitless options of the board also allow multiple types of content to be added, unlike apps such as Notes which also have limitations on formatting.

The big picture? Freeform offers a blank page with endless ways to engage and collaborate.

Using Freeform with Jamf Teacher

So how to make the most of this collaboration space? Jamf Teacher can help you control the management and flow of information to all your students and their classroom devices

As Mat Pullen, Jamf senior product marketing manager, education, demonstrates in the “Using Freeform with Jamf Teacher” video, there are fantastic opportunities to create collaborative learning space designed with Freeform on iPad, with Jamf Teacher making it simple and easy to get that information in the hands of your students.

Pullen demonstrates how to use Freeform to create a simple lesson starter, and how easy it is to use Jamf Teacher to incorporate this new tool into “create lesson” templates to quickly distribute the information you want to the students of your choice, to allow collaboration across your class of devices.

Interested to learn more about using Jamf School?


Security 360 Highlights: User privacy

Month: May 2023

Author: May 23, 2023 by Jesus Vigo

Source: https://www.jamf.com/blog/security360-user-privacy-protection/

In the previous series opener, we discussed phishing and social engineering attacks, highlighting how this cybersecurity concern remains at the top of the list of threats and attack types employed by threat actors as they attempt to compromise devices, users and data across the modern threat landscape.

Switching gears ever so slightly, we continue to draw from Jamf’s Security 360: Annual Threat Trends Report as we dive into a growing trend that is not an attack type but rather the target of various threats: user privacy data. In this entry, we go into detail as we discuss:

Without further ado, let’s start with something easy!

What exactly does “user privacy” mean?

“User privacy” is a term used to refer to the data types that contain personally identifiable information, or PII for short. When thinking of data, like a Word document or email attachment, those files in and of themselves are labeled as data. However, by drilling down further to determine the contents of this general data and peering into what the data contains(or rather, what the data’s about), do we get a better idea as to whether or not it contains any information that could reveal the identity of the user that created or modified it.

Privacy data can come in various forms, whether it explicitly states information in plain text like a spreadsheet, depicts the user in question in a photograph or uses metadata to clue in on a user’s identity – whether in whole or in part – these and many more examples can potentially expose users while simultaneously violating their right(s) to privacy if not secured properly (a more detailed listing of user privacy examples will be provided later in this article.)

Why is protecting user privacy critical?

When discussing the criticality of data protection, the data in question often fall into two buckets: regulated and non-regulated. Regardless of data type, keeping data safe is tantamount to ensuring that the utmost security controls are in place to keep unauthorized actors from accessing it. The critical difference is that regulated data types, like patient records or financial transactional information, are governed by local, state, federal, country and/or regional agencies to make sure that these data types are protected at all times. Failure to do so could result in breaking laws, leading to civil and/or criminal penalties – including the forced shuttering of business operations – if found in violation of these regulations.

“0.2% of users / 5% of organizations had a potentially unwanted application installed within their devices fleet in 2022.”

Conversely, while any of the agencies mentioned above does not govern non-regulated data violations, organizations found to be liable for failing to protect user privacy data—especially if harm comes to users because of this negligence—could still find themselves culpable and face civil and/or criminal penalties.

That said, there is one overarching reason above all others detailing why it is critical to protect user privacy data: threat actors are actively (and increasingly) targeting this type of data in attacks against users. The goal isn’t always to simply obtain this data. The impact of these attacks can extend to crimes ranging from blackmail and extortion to stalking and far more violent offenses. Sadly, it doesn’t end there, as threat actors may also sell the privacy data they’ve obtained to other criminal organizations. This extends the impact against targeted users and can be leveraged against them to perform illegal acts against other victims, businesses and government entities.

What types of data fall under the banner of user privacy?

There’s no specific file type associated with user privacy but rather relates to a quality of the data. More specifically, the quality of the data refers to it containing any information that can identify users in whole or in part. As the National Institute for Standards and Technology defines PII as “Anyrepresentation of information that permits the identity of an individual to whom the information applies to be reasonably inferred by either direct or indirect means.”

When considering the data qualities, it’s important to note that while some pieces of information can clearly identify users, such as full names or some form of unique identification number, like social security numbers in the U.S. Other bits of information may seem innocent enough on its own – but when combined with other attributes – presents a larger picture that reveals personal, private and even intimate details that could impose any manner of physical, mental, medical and financial threats to users, including impacting their reputation – both personally and professionally.

Below is a listing of the types of data classified as PII:

  • Full name
  • Birthday
  • IDs (passport, social security and driver’s or ID card, school ID numbers)
  • Home address
  • Communication information (telephone, email address, social media accounts)
  • Registration numbers (vehicle, certification IDs, permits)
  • Gender
  • Race
  • Sexual orientation
  • Records (medical and criminal)
  • Financial (debit/credit card, taxpayer identification and bank account numbers)
  • Place of employment
  • Digital fingerprint (credentials, web history, social media posts and devices used)

While the list is far from exhaustive, it does highlight some of the more common types of PII. Within PII, there exist two types of classifications: sensitive and non-sensitive. The former is categorized by information that can directly identify a user; the latter however is qualified by information that, while not being suitable to directly identify a user, can be used indirectly along with other forms of data to build a profile about the user.

How is privacy data used to target users?

“0.4% of Android devices had a potentially unwanted app installed in 2022 compared to 0.1% of iOS devices.”

By now you should understand what user’s privacy data is and why it is sensitive. However, in this section, we’ll talk about some of the ways in which threat actors are gaining access to privacy data, in turn using it against users themselves to target and victimize them.

  • Location services: This poses one of the biggest concerns for the physical safety of end-users as gaining access to a user’s location allows threat actors to know exactly where they are at any given time. This is especially dangerous for victims of stalking and those targeted by nation-state groups, like tracking journalists, political dissidents and government officials.
  • Contacts: An example of non-sensitive privacy data, obtaining access to a user’s contacts lists can provide additional targets while furthering the efforts in victimizing others through intimidation and harassment.
  • Calendars: Similar to the services above, accessing calendaring data could potentially yield a treasure trove of sensitive and non-sensitive PII alike. Appointments with doctors (medical), reminders to pay bills (financial) and critical meetings (business), including account information, meeting details with links and so forth are readily available in user’s calendars, giving away crucial information about where users are (or will be) and when.
  • Photos: With the proliferation of smartphones, it’s never been easier to carry a high-end camera with you to capture any and all moments. In fact, it’s become so ubiquitous, that usage has morphed by users relying on taking photos to remind them of well, everything. Items they like, important contact details, passwords and credentials – all alongside pictures of loved ones in private and public moments. Accessing this data and the EXIF metadata stored within the photos reveals a wealth of personal details about a user. Details ranging from private, personal moments to circumstances that may impact their professional life to even intimate moments captured digitally that were never intended to be shared in any capacity.
  • Bluetooth: All network connections pose a threat of leaking data if the communication is not secured properly. But unlike the other forms where only what is accessed at a given time is what’s communicated, Bluetooth is utilized for a number of near-field connectivity means. Sharing contacts, data and even transmissions made from externally connected devices, like mice movements or keystrokes entered into a keyboard. And once a connection is made successfully, the paired devices do not need to authorize access again in order to communicate – simply establish connectivity and access is restored. Potentially leaving users unaware that unknown devices could be gathering their PII.
  • Microphone: Another one of the biggest concerns is microphone access. With the growth of voice-controlled apps and services, the reliance on the mic is critical. Threat actors know this, which is why tapping the mic is one of the sources of obtaining PII. Additionally, since this is controlled as a part of the subsystem of the OS, there is no way to tell if a device has been compromised to eavesdrop on a user’s private conversations – during phone calls and while not in use – unless users are actively looking at their phone.
  • Camera: The third of the biggest concerns is camera access. Like the mic above, this provides a similar risk except that it is capable of recording not just audio but also video. Tapping into this feed can provide threat actors with privacy data that is both invasive and dangerous for personal and professional users alike. Recording screens during presentations of confidential information or turning on the camera at random times, such as spying on users at night or in the privacy of their rooms all lend themselves to compromising situations that could be used to extort or coerce victims into paying blackmail demands or even into committing crimes to prevent leakage of sensitive information.
  • Internet of Things (IoT): A relative newcomer to the list but one that is most alarming as reliance on Internet-connected homes, or “smart homes” continues to grow in popularity. Driven heavily by the adoption of IoT, compromising user devices may also mean gaining access to the apps/services that control their home and the things in it. Lights, door locks, and even major appliances, like ovens could be used to harass and intimidate while also providing key details about users, such as where they live, what their daily habits are and how many inhabitants there are, among other bits of data that can be used to spy on them and intrude into their lives further.
  • Files and Folders: The tried and true method of obtaining PII – through files and folders contained on devices and systems. Medical records, financial documents, password lists, details relating to hobbies, habits and generally anything that could be used to directly or indirectly piece together a profile on a victim can be contained within a file and read in plain text.
  • Input Monitoring: Similar to Bluetooth above, the digital age has brought with it other means of monitoring input besides hijacked communications and malware. For example, the range of swappable keyboards that are available for installation on smartphones carries with it the risk that the developer of the keyboard is being granted access to your keystrokes when users install their software keyboards and enable them. This means that users are handing away their right to protection by using these third-party keyboards. And while not all are malicious, some certainly are, while others may simply not take the appropriate steps to secure this data, leading to a data leak or vulnerability that could be exploited by threat actors just the same.
  • Screen Recording: Similar to the Camera above, modern OS’s have built-in software to record your screen. The ease of use in sharing tutorials or quickly grabbing the relevant bits of data needed in a pinch is beneficial to users. But they also serve threat actors as well, relying on this technology to record the actions being performed by their victims – often without their knowledge – and reporting it back for analysis to aggregate to their profile on the user. Like input monitoring, this could be a hidden “feature” of an app that is undisclosed to the user when they install a third-party app, granting it permission to record the screen whenever the threat actor wishes and placing the user at potentially grave risk for violating their PII.
  • Web History/Bookmarks: As discussed previously, PII falls into two categories. Web data, such as usage history, bookmarks and saved passwords, settings and extensions straddle the line between sensitive and non-sensitive. Meaning that depending on the context of the PII contained, it could either directly identify the user or indirectly be used to profile them. For example, a bookmark for a bank website – when paired with a randomly generated email account – could be used to indirectly build a profile on a user but doesn’t identify them outright. However, finding a website in the browser history that is linked to a cookie that contains the username of the account that last logged in and utilizes the user’s full name does identify the user directly. Depending on the sensitivity of the website visited, more PII could be gathered related to other factors, like gender, birth date and age among the more common bits to further crystalize the user’s identity.

User privacy is endpoint security

It doesn’t take a soothsayer to read the tea leaves surrounding the inclusion of user privacy within holistic security strategies. In fact, it’s been occurring for some time now with the legislature and regional laws, such as GDPR in Europe and numerous states in the U.S. drafting laws to protect user privacy with much the same priority as existing forms of data security.

And with the increased adoption of varying device ownership models, like BYOD support for personally owned devices,“the criticality to uphold user privacy requires that strategies to keep PII protected are prioritized and built into an organization’s defense-in-depth security strategy to ensure that company data stays safe without compromising user privacy – and potentially – ensuring compliance is maintained.”

Learn more about these and other growing threat trends impacting cybersecurity!


Jamf 170 Course and Exam Release

Month: May 2023

Author: May 22, 2023 by Randon Ruggles

Source: https://www.jamf.com/blog/jamf-170-course-and-exam-release/

We are excited to announce the release of the Jamf 170 Course and the Jamf Certified Endpoint Security Associate Exam.

Check out the Jamf 170 Course

The Jamf 170 Course is an introductory certification course focused on macOS security features, Jamf Pro, Jamf Protect and best practices to keep your fleet safe. Similar to the Jamf 100 Course, it is available online, self-paced and all content is offered for free.

Also similar to the Jamf 100 Course and the certification obtained by passing the Jamf Certified Associate exam, you can obtain certification in the Jamf 170 Course by passing the Jamf Certified Endpoint Security Associate exam.

Why should you take the Jamf 170 Course?

It’s no small ask to keep computers secure and safeguard user data. Jamf Protect provides the toolset to identify malicious activities, source analytics, and leverage MITRE ATT&CK framework intelligence. Even if you’ve been managing Apple devices for a while, the proper usage of security tools can be a lot to take in. That is why we designed the 170 to help you build a framework to understand and employ the features of Jamf Protect from the ground up. Like the Jamf 100 Course, we start with a core set of content and plan to expand the curriculum over time. The current Jamf 170 Course contains 9 core lessons separated into three main sections.

We believe it’s crucial to provide context for the many features available in Jamf Protect. In this course, we start with the basics by covering security features available on all Mac computers. Many of these features are configurable by users, can be monitored in Jamf Protect and enforced with a mobile device management (MDM) solution like Jamf Pro.

Next, we explore the MITRE ATT&CK Matrix, CIS benchmarks and the macOS Security Compliance Project. These frameworks are critical to understanding how malicious actors try to exploit security vulnerabilities. By understanding how and why exploitative activities are executed, we prepare you to mitigate those endpoint threats.

In the final section, we dive into Jamf Protect and explore alerts, analytics, plans and much more. You’ll learn how to monitor and mitigate threats, leverage your knowledge of the MITRE ATTA&CK Matrix, and use CIS benchmarks to preempt dangerous activity. We also introduce a simulated Jamf Protect environment, where you’ll create alerts, prevent lists, actions and plans. This allows you to complete tasks based on lessons in the 170 Course to check your understanding before jumping into a live environment.

After completing the Jamf 170 Course, you can test your knowledge with the Jamf Certified Endpoint Security Associate Exam. You can prepare to get certified with the section reviews, practice exam, and interactive simulations.

A solid understanding of the content offered in the 170 not only prepares you to succeed in the Jamf 370 Course, but to start using Jamf Protect to secure endpoints in your organization and ensure the safety of your users.

Start your training today

We are pleased to offer the 170 and the associated certification exam to you and your colleagues. Our goal is to create engaging and meaningful learning experiences, and look forward to seeing you there.

Thank you and let’s get learning about endpoint security!

Learn more about the Jamf 170 Course.


First look: Rapid Security Response contents

Month: May 2023

Author: May 19, 2023 by Emily Kausalik

Source: https://www.jamf.com/blog/first-look-rapid-security-response-contents/

What are Rapid Security Responses?

Apple introduced a new kind of security update mechanism as part of iOS 16 called Rapid Security Responses. According to Apple, Rapid Security Responses (RSR) are a new type of software release for iPhone, iPad and Mac that deliver important security improvements between software updates.

Apple’s first RSR release

On May 1, Apple deployed its first Rapid Security Responses for devices running iOS 16.4.1 and macOS 13.3.1. The update versions were 16.4.1 (a) and macOS 13.3.1 (a) and, at the time of the release, no information was published about the security contents of the update. This left many wondering what exactly was patched with this urgent release.

The impression given at last year’s WWDC when Rapid Security Responses were introduced was that the updates would be ephemeral and rolled up into future security releases for the minor version of macOS, iOS, iPadOS, etc., with more information provided at a later time.

Security release notes

This week, Apple released macOS Ventura 13.4, iOS 16.5 and iPadOS 16.5. We’re now seeing our first set of security release notes that call out the security patches shipped as part of the Rapid Security Responses, which confirm the rollup release strategy with their security updates.

The Apple security updates page is the placeholder for all Apple security updates that are shipped from Apple. Each of the latest macOS, iOS and iPadOS updates include information about all of the security vulnerabilities that are addressed with each respective release.

Notably, we now see exactly how Apple will be denoting which vulnerabilities were fixed with the Rapid Security Responses shipped earlier this month by labelling specific CVEs as being “first addressed” with the Rapid Security Responses supplemental build detail.

Screenshots of the CVEs patched with the Rapid Security Responses shipped on May 1 (related to WebKit) are below, with Rapid Security Response macOS 13.31 (a) shown first and iOS and iPadOS 16.4.1 (a) shown second.

The benefit is real

Apple occasionally includes language stating “Apple is aware of a report that this issue may have been actively exploited” in security release notes. Two of the three CVEs patched in the Rapid Security Responses carry this disclaimer.

Therein lies the benefit of Rapid Security Responses: Apple was able to issue a security fix more than two weeks ahead of the next planned operating system releases. This new vehicle for security fixes should dramatically improve Apple’s ability to patch actively exploited vulnerabilities, which is great for individual users and for organizations using Apple devices.

Especially important for organizations deploying Apple at work or school is ensuring their device management solution is prepared to support the new Rapid Security Responses. Importantly, Jamf Pro was ready to both report on and deploy the new Rapid Security Responses when they were released earlier this month, giving organizations immediate visibility into the security posture of their fleet and a method to remotely deploy these critical software updates to devices.

Manage and report on Rapid Security Responses

This is only the beginning of this new approach with more dynamic security updates from Apple and we expect that they will continue to issue new Rapid Security Responses to patch actively exploited vulnerabilities.

Learn how Jamf Pro can help your organization report on and manage Rapid Security Responses for macOS, iOS and iPadOS.


Explore Declarative Device Management in Jamf School.

Month: May 2023

Author: May 19, 2023 by Anthony Darlow

Source: https://www.jamf.com/blog/declarative-device-management-jamf-school/

What is Declarative Device Management (DDM)?

Announced at WWDC 2021, Declarative Device Management (already known as DDM; Mac admins love an abbreviation) is MDM 2.0. In a nutshell, DDM will make devices smarter and reduce network chatter between a device and the MDM server. With DDM, devices will autonomously update the MDM server of its current state. Devices will also be able to evaluate their own states and apply or disable settings based on this analysis.

It’s best to point out that DDM is not a replacement for MDM. It’s a framework within the MDM spec, which offers a new way to manage Apple devices that sits alongside and works with MDM.

Empower teachers, parents and students with Jamf School.

Why should we care about Declarative Device Management (DDM)?

The MDM spec as we know it today has been around for 10 years or so— a super long time in the IT world. Things change, more devices get deployed and technology gets better. Declarative Device Management is Apple’s answer to the ever-changing landscape of IT.

To understand the huge impact DDM will have, we first need to understand how MDM works today from a high level.

How MDM in education works today

Today there is a lot of back-and-forth communication between the device and the MDM server; essentially the device doesn’t do anything from a management point of view unless the MDM server tells it to. And the device doesn’t know it has to check with the server until the server tells the device it needs to check in!

Typically this is how communication between a device and its MDM takes place:

  1. The MDM server asks Apple to send a Push to Device to ask a device to check in.
  2. Apple asks the device to check in with its MDM server.
  3. The device then reaches out to the MDM server saying “I’ve been asked to check in.”
  4. The MDM server might then say, “Please can you tell me your state (things like OS version, passcode enabled, apps installed, etc.)?”
  5. The device then replies with the information requested.
  6. Based on this, the server might push an additional configuration for the device.
  7. The device then applies this configuration.
  8. The server then asks the device to update its state again or to confirm that it has applied that new configuration.
  9. The device then replies with the updated state.

This is a lot of network traffic between the device and the MDM server for just one exchange. Now, multiply this by many transactions per day and by hundreds or thousands of devices in your deployment. In addition, if the device changes state at any time before the MDM server again asks for check-in, the MDM server —and therefore the admin— has no idea of the change.

What’s wrong with the way things are now?

Let’s take an example.

We have a device that has just checked in and reported that it is secured with a passcode. As a Jamf School admin, I am able to see in the console that the device is compliant with our passcode-set policy. If the device does not have a passcode set, I will add an additional configuration that hides apps containing sensitive data, such as email clients or cloud storage apps, by sorting it into a Smart Group.

Five minutes after the device checked in, the user decides they are going to take the passcode off the device as they are tired of entering it over and over again while working in a coffee shop.

The device is no longer compliant with our policy. However, if I as a Jamf School admin check the console, it’s still showing as compliant and will still show as compliant until the device checks in again.

That means that until the device checks in again, the device does not know it needs to apply the additional configuration, so those sensitive apps are still available on the device. In the meantime, the user leaves the coffee shop but forgets their iPad. Somebody else in the coffee shop picks up the device and starts browsing the emails of the user, who just happens to be a headteacher or principal at a large secondary school.

How often a device checks in is dependent on the MDM product you are using, but Jamf School’s check frequency is every two hours. This means that it can take up to two hours before the device would have checked in with Jamf School, reported that it no longer had a passcode, and got sorted into a Smart Group to apply the additional configuration to hide the sensitive apps.

How will DDM improve my workflows?

  • The Status Channel: a way that devices can proactively report the current state of certain device inventory data back to a server that subscribes to that Status Channel. Devices can now autonomously report changes in status within seconds of the change.
  • Declarations enable the device to decide what configurations to apply based on its state. For instance, if we wanted to apply a VPN configuration but only if the device has a passcode, Declarations gives the device all of the information about the VPN config and the conditions that need to be met in order to apply it all in one go. Once the device meets those conditions, it autonomously applies the VPN configuration.

DDM will not only decrease the chatter between the device and an MDM server; it will also provide a much smoother user experience.

And that’s the aim: technology that supports teaching and learning without getting in the way.

I highly recommend watching the Declarative Device Management session from WWDC 2021 for a more in-depth look.

What specific support for DDM has Jamf School added?

Jamf School has added support for a number of inventory items to be provided by the Status Channel. These include model information, OS information, device identifiers and passcode status.

Full Jamf support for DDM list:

  • device.model.family
  • device.model.identifier
  • device.model.marketing-name
  • device.operating-system.build-version
  • device.operating-system.family
  • device.operating-system.marketing-name
  • device.operating-system.version
  • device.identifier.serial-number
  • device.identifier.udid
  • passcode.is-compliant
  • passcode.is-present

As a Jamf School admin, there is nothing for you to configure. Jamf School will automatically send a remote management command to enable Declarative Device Management on eligible devices.

Eligible devices require either macOS 13 or later, iOS 16.1 or iPadOS 16.1 or later, or tvOS 16 or later.

With new device inventory items of “Declarative Device Management supported” and “Declarative Device Management enabled” in the Jamf School console, it’s easy to see your eligible devices and if they have DDM enabled.

For more information, read the Jamf School documentation.

Does Jamf School’s support for DDM affect me today?

Over and above near-instance reporting of the inventory items above, which in itself can be useful around new OS release time, this update mainly won’t affect Jamf School admins.

That being said, the fact that one of these items is the passcode does bring a nice improvement to the example I described above where the user turned off the passcode and left it in the coffee shop, exposing sensitive data.

If we now look at the situation with Status Channel support, we’ll see a much-improved experience. Since reporting if the passcode is or is not present is a channel that Jamf School subscribes to, within seconds of the user removing the passcode the device proactively and autonomously reports the passcode status to Jamf School. This is DDM at work.

Once Jamf school is informed of the change (ie it’s moved from passcode is present = Yes to passcode is present = No) it has been able to recalculate the Smart Group membership of devices without a passcode, within seconds of the user removing it. Since the device is now in this Smart Group it requires the additional configuration to hide the sensitive apps and will use what I will call here “Traditional MDM” to deploy the profile.

The result is that within a few minutes (my testing shows within 30 seconds mostly) of the passcode being removed, the device then also hides the sensitive apps.

Now this is a huge improvement using just the Status Channel and then reverting to MDM and the server-side deployment. Of course, in the future, there’s the possibility that this could all be done instantly and autonomously using Declarations.

The future of Jamf School DDM support

The recently-added support for DDM is really exciting! Although today, reporting inventory data via the State Channel doesn’t have a huge impact on Admins, we can clearly see with the passcode example, it’s the start of the future of Apple Device Management for Jamf School.

As stated above, the Status Channel is just one part of Declarative Device Management with Apple providing more elements of the framework each year, I’m looking forward to Declarations becoming widely available.

It’s going to be a game-changer. Bring on MDM 2.0 and bring on WWDC 2023! I’m sure it’ll bring more to the table for DDM.

Try Jamf School today!


What can you do with Managed Apple ID?

Month: May 2023

Author: May 18, 2023 by Laurie Mona

Source: https://www.jamf.com/blog/how-to-use-managed-apple-id/

Every organization that uses Apple devices needs to understand how to make the best use of Apple IDs, whether personal or managed. Apple IDs are the key to unlocking the potential of every Apple product and service. You need Apple IDs to:

  • Access key Apple services – e.g. App Store, Apple Music, iCloud
  • Manage an account across all of a user’s Apple devices and services

Although individuals who use Apple devices for their personal use may also use their personal Apple ID for work devices, there are advantages for businesses who create Managed Apple IDs for their employees.

Manage your Apple devices with Jamf Now or Jamf Pro.

Why are Managed Apple IDs important?

To fully appreciate the advantages of Managed Apple IDs, it helps to understand the purpose of Apple IDs. An Apple ID is created by an individual to be used to authenticate and log into a device. It stores user settings that the device will recognize when that ID is used. While these IDs are primarily created for personal use, until recently they were also used on company-owned devices.

Using personal Apple IDs for work-owned devices creates challenges because the device management processes were designed for personal use, not the business world, including how to handle updates and personal information. But using business emails as personal Apple IDs for work creates issues as well, including the too common problem of when an employee leaves the company, but the locked device remains.

The solution: Your company can create Managed Apple IDs to better manage and secure the devices employees are using for business purposes.

Managed Apple IDs are accounts designed specifically for businesses and schools that enable access to key Apple services. Unlike with personal Apple IDs, IT administrators can manage the services that your Managed Apple ID can access.

These free services unlock the benefits of tools to help those who manage Apple devices, helping you automate and simplify the deployment, management and security of the devices. These tools can help you standardize employee onboarding and offboarding, and use Apple ID for business as designed.

Managed Apple IDs are unique to your company and separate from Apple IDs that you can create for yourself. You can associate your Managed Apple ID with the same email address and phone number as your personal Apple ID.

Creating and using Managed Apple ID

While managed Apple IDs can be made manually using Apple Business Manager (ABM) or Apple School Manager (ASM), most organizations will use a federated authentication method to centrally manage organizational identity.

Federated authentication is currently supported by a link to Azure Active Directory (Azure AD) or Google Identity via a supported Google Workspace domain. Azure AD can be further federated to other identity provider solutions (Okta, OneLogin, etc) through a WS-authentication or SCIM connection. A paid subscription is not required for Azure AD for federation.

A Managed Apple ID allows a mobile device management (MDM) solution like Jamf to provide a feature called User Enrollment. Introduced in iOS 15 and iPadOS 15, User Enrollment allows a simplified workflow requiring only an organization email address and password.

User Enrollment works with either Google Workspace or Azure AD managed by either Apple School Manager or Apple Business Manager and a third-party MDM solution. To take advantage of synchronization with Google Workspace or Azure AD and User Enrollment, your organization must first:

  • Configure Google Workspace or Azure AD
  • Prepare for federated authentication with additional configuration if you have a local version of Active Directory
  • Sign up your organization in Apple School Manager or Apple Business Manager
  • Set up federated authentication in Apple School Manager or Apple Business Manager
  • Configure an MDM solution and link it to Apple School Manager or Apple Business Manager
  • (Optional) Create Managed Apple IDs

The user’s personal device will be under limited control for the privacy of both the organization as well as the private, personal information of the device owner. For Bring Your Own Device (BYOD) employees, this company-specific managed ID allows employees to maintain privacy and separation from their personal Apple IDs.

As security of private data faces new threats, User Enrollment with Managed Apple ID enables true data separation, with enterprise iCloud data kept separate from personal iCloud data.

Using Managed Apple IDs by device ownership type

It’s important to consider the type of device ownership your employees have when looking at Managed Apple IDs.

  • Bring Your Own Device (BYOD) – If employees are providing their own personal devices, enabling usage of iOS or iPadOS devices – via User Enrollment — requires Managed Apple IDs.
  • Corporate Owned devices – All device types that are corporate-owned can be used with Managed Apple IDs.

You also need to consider whether devices will be used 1:1 or will require shared access.

For shared devices, Managed Apple IDs can be used to enable roles delegation to allow access to specific resources and applications assigned by role.

Opening up IT Admin control

Your IT team either manually creates Managed Apple IDs in ABM/ASM or through a federated authentication method and manages them from that ABM/ASM portal. This means your employees won’t have to worry about creating their own Apple IDs, managing those Apple IDs or downloading the tools and software they need. All of this will come from IT, Apple’s free programs for app purchasing and device enrollment and will be deployed through your MDM; this results in more control over devices as well as a smoother onboarding and off-boarding process.

Your IT team will also have control over creating and managing the Apple ID used for Apple Push Notification Services (APNs) certificates.

Device processes your IT Admins will be able to control include:

  • Restricting access to accounts
  • Removing accounts
  • Updating account information
  • Pushing content
  • Assigning roles and privileges
  • Sharing of iPads with Managed Apple IDs
  • Managing Contacts, Calendars, Reminders, iCloud Drive
  • Specifically for schools: allows usage of Apple’s Classroom App for class management

Why Managed Apple IDs are important for business and schools

More benefits of using Managed Apple IDs in your organization include:

  • Increased security: This layer of management provides a wholistic view and understanding of what is being put on the devices (e.g. apps, books, content). Because all apps and tools are pushed by IT and ABM/ASM, each app can be properly vetted before deploying to devices. This allows you to verify that every tool is secure, prevent employees downloading unsecure or rogue applications and ensure that all company and client data is only backed up and saved in places you approve.
  • Less work for end user: With IT managing their account, employees don’t have to worry about managing it. Not only do users not have to feel responsible for managing their credentials and day-to-day management, but Managed Apple IDs also offer enhanced collaboration across apps. Ease of collaboration helps your employees get more done, more effectively and help you achieve your business goals.
  • IT control over devices: With Managed Apple IDs managed by IT, troubleshooting is easier as you don’t have to rely on employees to remember their Apple ID credentials. Not to mention, when employees leave your organization, there’s no risk of being unable to access the device because you don’t know the credentials. Non-federated Managed Apple IDs also enable utilization of IT as a “service account”; APNs that aren’t linked to an individual’s Apple ID prevent issues if IT staff leaves.

Improving your bottom line with better management

After weighing the pros and cons, your organization may realize it’s time to use Managed Apple IDs to simplify your device management and security. Designed by Apple, for Apple devices, it’s one more way to make life easier for your organization, your IT department, and ultimately your end user.

Try Jamf today!