Virtualization Technology News and Information
Article
RSS
VMblog Expert Interview: Using Managed Device Attestation to Secure the Mobile Workforce

interview smallstep malone 

At the Apple Worldwide Developer Conference (WWDC) earlier this year, the company announced that it was building in additional capabilities, for those running in iOS/iPadOS/tvOS 16, to establish device identity otherwise known as Device Attestation. Managed Device Attestation is a new capability that helps ensure servers and services (on-premise or in the cloud) only respond to legitimate requests for access to resources. This approach allows Apple to use the ACME protocol in new ways, taking out hours of manual labor by IT professionals in enterprises everywhere. No longer will they have to have the physical devices sent to them to prove the device identity before it's given to the user - now it's a simple and automated enrollment process once the user receives the device.

To fully understand the significance to enterprise IT, we caught up with Mike Malone, founder and CEO of Smallstep to talk about MDA and what Smallstep is doing to support it.

VMblog: We last spoke in June. What should enterprises be thinking about in relation to certificates for securing distributed systems? 

Mike Malone: The reality of the way companies work is changing. The shift to remote/hybrid offices has become more permanent, making the way that IT departments secure their systems complex. Mobile Device Management (MDM) solutions paired with the Simple Certificate Enrolment Protocol (SCEP) are often used as a solution, but they have a critical shortcoming: there isn't a way to cryptographically verify that the SCEP profile is on the correct machine. 

There is a better way now. A new ACME challenge type proposed by an engineer at Google to the Internet Engineering Task Force (IETF), called device-attest-01 and branded Managed Device Attestation by Apple, binds an identifier to a specific device using cryptographic hardware. 

VMblog: What is Managed Device Attestation and why should we be talking about it now?

Malone: Managed Device Attestation works to create a second boundary of trust around which the device management solutions can work to protect against security breaches. With companies like Apple announcing their support behind Device Attestation with Microsoft and Google not far behind, a better security posture for end user devices in every enterprise is a reality.

VMblog: How will this revolutionize the work of IT professionals in enterprises everywhere?

Malone: All the functionalities of the ACME protocol make its use on private networks more powerful - a way to securely get certificates for end user devices without a SCEP password. With teams of all types (hybrid, remote, in-office) using personal and company devices for their work, IT professionals are feeling the pressure for better authentication on every device with access to mission-critical resources. By allowing employees to securely self-enroll devices without help desk or IT support, IT teams will have more freedom to focus their time and money on managing and maintaining technology for a business' benefit. 

VMblog: How does it work?

Malone: Organizations rely on MDM solutions for several reasons, including credential provisioning, configuration management, and compliance monitoring. MDM solutions typically use outdated protocols such as SCEP to provision credentials and may not confidently assure the identity of the device that's being enrolled. Managed Device Attestation, built on the new ACME Device Attestation challenge, combines a hardware-bound, cryptographic identity with a modern protocol for certificate automation. This combination offers a higher assurance of the device's identity than typical enrollment methods. This makes it a secure foundation for other functionalities that require a trusted identity.

VMblog: As a thought leader in this area, what can we expect from Smallstep and what will Smallstep's role be as it moves forward? 

Malone: Managed device attestation is the next step for Smallstep in securing distributed systems and another place for TLS certificates to shine in a cryptographically secured environment. Using the ACME protocol on all end user devices (including things like routers) in addition to using certificates to authenticate humans creates a hard stop for breaches based on shared credentials to exist. Short-lived/trusted TLS certificates for every device with ACME and managed device attestation are the future, and the future is now.

##

Published Thursday, November 10, 2022 9:35 AM by David Marshall
Filed under: ,
Comments
There are no comments for this post.
To post a comment, you must be a registered user. Registration is free and easy! Sign up now!
Calendar
<November 2022>
SuMoTuWeThFrSa
303112345
6789101112
13141516171819
20212223242526
27282930123
45678910
OSZAR »