Using peripherals securely
Advice for IT system administrators on the secure management of peripherals for smartphones, tablets, laptops and desktop PCs
Most modern mobile devices allow you to connect peripheral devices such as external hard drives, printers and cameras. This is achieved through short range wireless connections like Bluetooth as well as physical interfaces such as USB and Thunderbolt.
These interfaces have many benefits. But, they also provide an additional route through which attackers can reach your device and the data it holds.
This guidance will help you plan for the security implications of peripherals, balancing their required use against the additional risks they can introduce to mobile device security.
Why manage peripheral use?
Risks related to peripherals and their interfaces include direct memory access attacks (DMA), debugging attacks or alternative boot paths that can result in the loading of malicious code from peripheral devices, as well as data transfer over wireless protocols that may lack confidentiality and integrity protection.
Access and use of these interfaces should, therefore, be carefully considered. Organizations should assess the benefits against the risk of allowing users to connect devices over external interfaces.
It is important that organizations educate users on the security risks from connecting peripheral devices and apply technical controls to restrict or disable access from peripheral devices if not required.
Preparation for peripheral management
The risks from peripheral devices and external interfaces come in a variety of forms. We have broadly classified these risks based on external interface type in the table below.
Your organization will need to consider these risks carefully when determining whether to permit use of peripheral devices or external interfaces. This will require a careful balance of user requirement vs. security risk, alongside any mitigations available on the mobile device.
Table 1: Interfaces and associated risks
External Interface | Risk |
---|---|
Removable media (including USB & SDcard) | Removeable media including USB drives and SD cards can provide a convenient means of backing up or sharing data between devices. Allowing removable media access also opens up risks of data theft or data loss. Data stored on removeable devices may not necessarily be encrypted or protected by any form of device authentication, and therefore if lost, could result in data loss, with no way of restricting access to that data or wiping it from the device. It also offers an additional path from which malicious software could be installed, outside of approved software installation processes. |
Other USB | Beyond removeable media, USB devices can provide additional capabilities that could be abused for malicious purposes. A good example of this is the USB Rubber Ducky. This tool masquerades as a USB keyboard, allowing its user to execute malicious commands on the device it is connected to. This could present additional risk of device exploitation or data loss. |
DMA-capable interfaces, such as | Certain ports support a feature known as direct memory access (DMA). This feature allows devices to access main memory outside of the control of the CPU, allowing faster data rates. DMA can be abused though. For example, a rogue DMA device could be used to scan physical memory to extract cryptographic keys and passwords or install or run malicious software through memory modification attacks. |
Wireless - Bluetooth/other proprietary | Wireless interfaces such as Bluetooth can provide a very simple and convenient means of pairing of devices for data sharing. They can also permit attackers unauthenticated access to devices, potentially resulting in data loss or execution of malicious code. |
Syncing interfaces | Most modern mobile devices including iOS and Android provide features for syncing of device data to external devices. For example, a laptop backing up data via external interfaces, such as USB. For organizations, there’s a risk that devices will be transferring data to external devices that they do not control. |
Debugging interfaces | Debugging is the process by which computer programs can be examined and profiled for the means of analyzing their functionality, often for the purpose of ensuring their correct functionality. Techniques can be interactive, allowing direct access to main memory and critical system structures. Debugging is not exclusive to software alone, and many devices can also allow for debugging of hardware devices through external interfaces, although the ability to perform debugging using these interfaces should be closed after manufacturing. |
Bootable interfaces | Certain interfaces, such as USB and Thunderbolt can provide support for alternate boot paths and boot devices. Booting operating systems from external devices could allow for unauthenticated access to device data and data theft. |
How to manage peripherals
In deciding whether or not to allow use of peripheral devices, you should follow a risk assessment process which balances business need against security risk.
You should:
Assess the business requirement for use of each type of external interface.
Assess the security risks posed by access to external interfaces from peripheral devicesbalanced against the mitigations that are available on the device.
Determine technical controls available on the mobile device to restrict access to external interfaces.
Set a security policy for connection of peripheral devices, balancing user needs with technical risk.
Where possible, use mobile device management to manage access to peripheral devices and external interfaces. Or, consider using third-party software that provide additional management options for external interfaces.
Provide guidance to users within the organization on the use of peripherals, security risks, and the associated security policy.
Depending on the device, operating system and remote management capabilities, we would recommend applying the following technical controls where available:
If access to external physical interfaces is not required, then disable access to these interfaces.
For short range wireless interfaces such as Bluetooth, if not required then disable them. Otherwise, don’t allow pairing to new peripherals, or only managed peripherals.
For mobile devices, which have external interfaces that support DMA, installation of new DMA devices should be prevented when the device is locked.
Device interfaces that can provide alternate boot paths or debugging capabilities should also have these features disabled if not required.
Access to change required device settings should be restricted to admin users only. This includes operating system and firmware settings.
External interface adapters, such as USB data blockers, can also be purchased for different physical connections that can block data transfer, while still allowing for limited functionality such as charging support.
It should be noted that some of these technical controls may have to be managed and configured through the device firmware settings, as well as through the operating system.
Where technical controls are not available, procedural controls must be used instead, possibly supported by logging and auditing.
Specific technical controls will vary between types of devices and not all devices will provide technical controls that can mitigate all risks. We’ve listed some of these aspects below, and grouped them by device type for Android, iOS, macOS and Windows 10 devices.
Table 2: Technical controls available by operating system
Operating System | Technical controls |
---|---|
Android | MDM can be used to disable USB debugging and Developer Options. |
iOS | Administrators can use MDM settings on supervised devices to control connection of external devices, as well as restrict pairing to other hosts. |
macOS | USB and other removable media can be blocked through MDM if required. |
Chrome OS | Bluetooth can be disabled using MDM policy settings. |
Linux | It may be possible to disable Bluetooth and access to external ports such as USB through the settings UI or through the operating system configuration files. It may also be possible to disable some interfaces through device firmware settings. |
Windows 10 | Device connectivity restrictions for Bluetooth can be configured through MDM policy settings. |