📜 ⬆️ ⬇️

Email protection in organizations using mobile devices

image Today in Russia, an increasing number of employees use personal mobile devices in the workplace. This phenomenon, called BYOD (Bring Your Own Device), necessitates the protection of corporate data, which, above all, is important for organizations with high requirements for information security.

BYOD policy is very effective both in small companies and in large corporations. First of all, it allows you to significantly save on the purchase of office equipment and provides employees with the opportunity to always stay in touch with colleagues and get access to working documents and company resources from any place. In addition, in many companies, managers use BYOD as a way to attract and retain qualified professionals. Employees who are accustomed to their devices are not particularly happy when the employer tells them that it is prohibited to use a personal phone or tablet at the workplace and will have to work with the equipment provided by the company. It looks archaic and restrictive. Especially if the equipment provided by the employee is worse than the advanced gadgets belonging to him.

At the same time, the thoughtless and uncontrolled use of personal devices in the company can cause irreparable damage to it. Therefore, in order to achieve the desired effect, company executives are required to grope a rather thin line between potential risks and potential benefits.
')
Most employees use personal mobile devices to access corporate email. Therefore, in this article we will look at the email encryption setting algorithms on mobile devices running iOS (5+) and Android (4+), which can be useful in organizing the protection of corporate mail.

In both cases, to configure the encryption function, we need:


Creation of certificates, as well as their subsequent distribution to employees of the company, may be entrusted to one person - the system administrator. The system administrator creates pfx certificates on his computer for all users who plan to use mail encryption on their mobile device, exports these certificates into separate files and then sends each of the users along with the certificate of the Certification Center and detailed instructions for setting up the encryption function. Also, he must tell each user his password to the pfx file.

image

Email Encryption on iOS Mobile Devices


1. We send the received certificates (the key file .pfx and the certificate file of the root Certification Center .cer) to the e-mail installed on the phone, or transfer them to any folder (including in the horse folder) via usb connection to the computer.

2. Create an email account on your phone. To add a new account, click Add . After creation, open Settings . Next Mail, addresses, calendars (Fig. 1) - The name of your account (in this example, it is Dorf pop (Fig. 2). - Account. (In this example, vostrikov@dorf.ru (Fig. 3). Assumed that your mail account is already configured.

3. Click on your account, mail settings open. Click Advanced (Figure 4). In advanced settings, use S / MIME . Next, click the button Uch. Record (Fig. 5). In the Account menu, click Finish to save the settings.

image

4. Select Account again - Advanced . If we go to the Encryption and Signature tabs, we will see that there are currently no suitable encryption certificates installed. (Fig. 6-7). The Certificates tab is now inactive, so we need to install the certificates created earlier.

5. Install the certificate of the Certification Center. Once we click on the file with the * .cer extension (Fig. 8). Select Install (Fig. 9). A warning page will open. Click Install (Fig. 10). Certificate Certification Center installed. Click Finish to return to the mail menu (Fig. 11).

image

6. Install a personal certificate. Once we click on the file with the extension * .pfx (Fig. 12). Click Install (Fig. 13). A warning page will open. Click Install (Fig. 14).

7. Enter the password for the certificate. It is identical to the password you set when creating your personal certificate in CyberSafe. Click Next (Fig. 15). Profile is installed. Click Finish .

image

8. Go to Settings - General Profiles tab (Fig. 16). Now the profiles of the Certification Authority and User Certificate are installed (Fig. 17). By clicking on them, you can get more information about certificates.

9. Go to Settings - Mail, addresses, calendars - Name of your account - Your account - Advanced. We see at the bottom of the option Signature and Encryption . Click on them one by one and install certificates for signing (Fig. 18) and encryption (Fig. 19). Click Advanced - Account . In the window, click Finish to save the settings.

image

10. Similarly, the recipient creates and installs certificates on his phone, and then sends you a test letter. In the letter, he marks the option Sign . Having received the letter, we open it and see that it is signed (Fig. 20).

11. Click on the sender's email inscription (in this example, click on the email address anton@dorf.ru). We see that the certificate is trusted because a single Certificate Authority was used (Fig. 21). Click View Certificates . On the Certificate page, click Install (Fig. 22). Then click Finish .

12. Create a message to the recipient. Since we have already set the Encrypt and Sign options above, these options are enabled by default in the email. We send the recipient a letter (Fig. 23). The recipient, in turn, similarly installs your certificate. After that, the recipient can send you a test letter to verify encryption. In the letter, he notes Encrypt and Sign .

13. When viewing a test letter (Fig. 24), we see that the letter was decrypted, and the sender's certificate was correctly installed, and is in the list of trusted messages (Fig. 25). Email encryption is configured.



Email Encryption on Android Mobile Devices


1. We send the received certificates (the key file .pfx and the certificate file of the root Certification Center .cer) to the e-mail installed on the phone, or transfer them to any folder (including in the horse folder) via usb connection to the computer.

2. Since Android OS does not support encryption of mail through certificates, to configure encryption, we will use the djigzo program, which can be downloaded to the phone through the Play market .

3. After installing the program, go to the Main menu. To install certificates, go to Sertificattes & Keys (Figure 1). Use the Menu key to call the submenu for installing certificates and keys (Fig.2).

4. Select Import Sertificattes to import certificates (Figure 3). In the explorer, select the path to your certificate. Now we are installing the certificate of the Certification Center. This file has the extension * .cer. Here it is the file support@cybersafesoft.com.cer (Fig. 4). Select it from the list by clicking on the certificate, and add it to the list of certificates.

image

5. Next, in the list, select the root certificate support@cybersafesoft.com.cer. It is in the list of all certificates available on the phone (Fig. 5). Click on the certificate and in the context menu select the option Move to root store (Fig. 6). With this action, we add the certificate to the list of root certificates for the program.

6. Select Import Keys (Figure 2). Enter password. This is the password you specified when creating your personal certificate in CyberSafe on your computer (Fig. 7). In Explorer, select the path to the * .pfx file. In this example, this file is anton@dorf.ru.pfx (Fig.8).

7. Set a new password to the keystore (Fig.9). Click OK . The certificate and private key are imported (Figure 10).

image

8. Settings - Account . Set the necessary account settings, tick the box Sign, Encrypt, Add Signature line (Fig. 11).

9. Settings - SMTP . Install the mail settings (Fig. 12-13).

10. Check the installation of certificates and keys. Go to the option Compose message . Set the checkboxes on Sign and Encrypt and send any message to yourself. (Fig. 14-15).



11. Go to any email client on the phone. We see a message with a blue dot. This is our received message (Fig. 16). Open the letter, then use one of two options: Option 1. Click on the attachment in the .p7m format and select Open with the help of - djigzo in the context menu. Next - see p. 13. Option 2. Save the attachment in the .p7m format to the phone. Next - see p. 12.

12. Open the djigzo. Option Open message . In the explorer we find the saved file, click on it (Fig. 17).

13. Enter the password to the keystore. The message is decrypted (Fig. 18).

14. Messaging is controlled by the telephone's Menu button.

15. In order to exchange encrypted messages with partners, you need to send them a signed letter.
To do this, select the Compose message option in the program menu (Fig. 19). Set a tick on Sign , do not click the Encrypt button. We send the letter. The program will ask for the key store password. Enter the password, click OK .

image

16. The recipient must install your certificate in their program. Now he sends the signed letter to you. We receive a message (Fig. 20), open it. We see the smime.p7m attachment (Fig. 21). Save it to your phone (Next - see p. 17), or click on the attachment, and in the context menu select Open with - djigzo . (Further - see p. 18).

17. Open the djigzo program. Option Open messag e (Fig. 22). In Explorer, select the path to the saved file (Fig. 23).

18. Enter the password keystore.

19. We see that the message is decrypted, (Fig. 24) and the sender's certificate is in the list of certificates (Figure 25).

image

Email encryption is configured.

Source: https://habr.com/ru/post/212391/


All Articles