- Employees must accept installation of the company's security profiles on the device in order to access company networks and data.
- Notify IT at once if the device is lost or stolen, or the employee no longer needs company access.
- Codify the company's right to wipe the device, even an employee-owned device, if it's lost or stolen, or the employee leaves the company.
- Require users to back up their iOS device via iTunes.
- Reimbursement policies, if any, are clearly stated.
For companies that need higher level of security, IT can require stronger unlock passcodes; mandate the iOS hardware encryption feature be turned on; make use of certificated-based authentication for email, VPN, or Wi-Fi access via Simple Certificate Enrollment Protocol (supported by Apple) and a PKI and SCEP server; application encryption via new APIs for this purpose in iOS 4 (Jaquith notes that the iPad won't support iOS 4 until October 2010).
Two other options to consider are: the company's right to confiscated even an employee-owned iPhone or iPad in the event of an emergency (a standard practice in the Department of Defense, according to Forrester); and require nonpublic personally identifiable information (PII) and protected health information (PHI) to be removed from the employee's device, a requirement of some federal and state laws.
For company-owned iOS devices, there are yet more restrictive security options, though, "Forrester regards these policy options as excessive for personally owned devices, and we recommend that you implement these policies only sparingly," according to the report.
These additional steps include banning access to Apple's App Store, or the installation of apps, or both; blocking use of the iPhone camera; turning off the iPhone and iPad screen-capture feature (activated by pressing and holding the Home key); and block use of the apps such as the YouTube app, or even the Safari Web browser.
There are still weak points in implementing security for iOS devices, according to Jaquith. Apple's iPhone Configuration Utility, for example, generates the configuration profiles, but lags in automating various installation steps. This slack is being picked up now by third parties such as Sybase and Trust Digital, Jaquith says.
High-end device management tools are only now starting to become available, with new APIs in iOS 4. Several companies, including Sybase and MobileIron, are working with the new APIs to deliver centralized platforms for stronger iOS device management. Among their capabilities is the ability to selecively delete corporate data and apps while leaving user alonne.
Still missing in iOS are support for smart card authentication; compliance with FIPS 140-2 (the iPhone crypto software hasn't yet been certified); end-to-end email encryption; and SMS logging and archiving.
John Cox covers wireless networking and mobile computing for Network World. Twitter: http://twitter.com/johnwcoxnww. Email: firstname.lastname@example.org. Blog RSS feed: http://www.networkworld.com/community/blog/2989/feed. Read more about anti-malware in Network World's Anti-malware section.