Mobile Application Security: How Financial Services Companies Do It

14
Financial Services Securing Third Party Application Access Joseph Alviani, Salesforce.com, Technical Solution Architect @jalviani

description

Struggling to take your Force.com applications mobile because of security concerns? Some of the largest Financial Services companies use Force.com, and they have strict regulations regarding security and access to data. Join us to see how one customer leveraged IP Restrictions and Connected Apps to create a firewall that only Salesforce apps can get through, without any code. If they can do it, you can, too!

Transcript of Mobile Application Security: How Financial Services Companies Do It

Page 1: Mobile Application Security: How Financial Services Companies Do It

Financial ServicesSecuring Third Party Application Access

Joseph Alviani, Salesforce.com, Technical Solution Architect@jalviani

Page 2: Mobile Application Security: How Financial Services Companies Do It

Safe harborSafe harbor statement under the Private Securities Litigation Reform Act of 1995: This presentation may contain forward-looking statements that involve risks, uncertainties, and assumptions. If any such uncertainties materialize or if any of the assumptions proves incorrect, the results of salesforce.com, inc. could differ materially from the results expressed or implied by the forward-looking statements we make. All statements other than statements of historical fact could be deemed forward-looking, including any projections of product or service availability, subscriber growth, earnings, revenues, or other financial items and any statements regarding strategies or plans of management for future operations, statements of belief, any statements concerning new, planned, or upgraded services or technology developments and customer contracts or use of our services. The risks and uncertainties referred to above include – but are not limited to – risks associated with developing and delivering new functionality for our service, new products and services, our new business model, our past operating losses, possible fluctuations in our operating results and rate of growth, interruptions or delays in our Web hosting, breach of our security measures, the outcome of any litigation, risks associated with completed and any possible mergers and acquisitions, the immature market in which we operate, our relatively limited operating history, our ability to expand, retain, and motivate our employees and manage our growth, new releases of our service and successful customer deployment, our limited history reselling non-salesforce.com products, and utilization and selling to larger enterprise customers. Further information on potential factors that could affect the financial results of salesforce.com, inc. is included in our annual report on Form 10-K for the most recent fiscal year and in our quarterly report on Form 10-Q for the most recent fiscal quarter. These documents and others containing important disclosures are available on the SEC Filings section of the Investor Information section of our Web site. Any unreleased services or features referenced in this or other presentations, press releases or public statements are not currently available and may not be delivered on time or at all. Customers who purchase our services should make the purchase decisions based upon features that are currently available. Salesforce.com, inc. assumes no obligation and does not intend to update these forward-looking statements.

Page 3: Mobile Application Security: How Financial Services Companies Do It

Set the StageABC Company has the following in place today.

▪ Bring your own device model.▪ Org wide security settings are set to Public.▪ VPN access is only available for laptops.▪ Using both Federated and Delegated Authentication.▪ No Wifi Access in their facilities.

Page 4: Mobile Application Security: How Financial Services Companies Do It

The AskLimit which applications are granted access to the Org.

Page 5: Mobile Application Security: How Financial Services Companies Do It

What Do We Know▪ We can't leverage VPN on the mobile devices.▪ We can't rely on the Federated server to manage access.▪ The Following Requirements

• Ability to restrict mobile applications• Ability to permit certain applications to connect• Ability to control authorization of the application• Ability to manage the session timeout• Ability to control User Login Frequency• Ability to Enforce PIN Code

Page 6: Mobile Application Security: How Financial Services Companies Do It

ToolboxWhat do we have in our Toolbox to leverage?

▪ Trusted IP Ranges▪ Profile Based Login IP Range▪ Connected Apps

Page 7: Mobile Application Security: How Financial Services Companies Do It

Trusted IPRequirements Yes/NoBlock Mobile Applications Yes (Soap API), No (oAuth)Permit Specific Mobile Applications NoControl authorization NoConfigure Session Timeout NoControl User Login Frequency NoEnforce a PIN Code No

Page 8: Mobile Application Security: How Financial Services Companies Do It

Profile Based IP RestrictionRequirements Yes/NoBlock Mobile Applications YesPermit Specific Mobile Applications NoControl authorization NoConfigure Session Timeout NoControl User Login Frequency NoEnforce a PIN Code No

Page 9: Mobile Application Security: How Financial Services Companies Do It

Connected AppsRequirements Yes/NoBlock Mobile Applications NoPermit Specific Mobile Applications Yes (Application must participate)Control authorization YesConfigure Session Timeout YesControl User Login Frequency YesEnforce a PIN Code Yes

Page 10: Mobile Application Security: How Financial Services Companies Do It

Connected Apps

Settings for User or Admin

Authorization

Enforce or Relax IP Restrictions

Control how often users have to log

into the app.Force the user to use

two factor authentication.

Force Session Timeouts with a PIN

Page 11: Mobile Application Security: How Financial Services Companies Do It

DEMOConnected Apps with Profile Restrictions

Page 12: Mobile Application Security: How Financial Services Companies Do It

Joseph Alviani

Technical Solution Architect,@jalviani

Page 13: Mobile Application Security: How Financial Services Companies Do It

Other Security SessionsIntroduction to the Salesforce Security Model Tuesday, 12:15 p.m. - 1:00 p.m.

Dreamforce ‘12 RecordingsAuthentication with oAuth and Connected Apps

http://www.youtube.com/watch?v=SBeO-Jkx3LA

Taking a Pragmatic Look at the Salesforce Security Model

http://www.youtube.com/watch?v=XpoaRryUpmA

Single Sign-On and Access Management for Mobile Applications

http://www.youtube.com/watch?v=UYDdmWhiwYw

Page 14: Mobile Application Security: How Financial Services Companies Do It