{"id":19958,"date":"2022-08-26T10:30:12","date_gmt":"2022-08-26T18:30:12","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/08\/26\/news-13691\/"},"modified":"2022-08-26T10:30:12","modified_gmt":"2022-08-26T18:30:12","slug":"news-13691","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/08\/26\/news-13691\/","title":{"rendered":"What is Managed Device Attestation on Apple platforms?"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/idge\/imported\/imageapi\/2022\/06\/06\/11\/wwdc-2022-main-hero-100928697-large.3x2.jpg?auto=webp&amp;quality=85,70\"\/><\/p>\n<p><strong>Credit to Author: Jonny Evans| Date: Fri, 26 Aug 2022 09:43:00 -0700<\/strong><\/p>\n<p>Announced at <a href=\"https:\/\/www.computerworld.com\/article\/3663681\/how-apple-improved-enterprise-deployments-at-wwdc.html\">WWDC 2022<\/a>, Managed Device Attestation protection shows that Apple is adjusting device security protections to adapt to an increasingly distributed age.<\/p>\n<p>This adjustment reflects a reality shift. Work doesn\u2019t happen on specific servers or behind defined firewalls today. VPN access can differ across teams. And yet, in a workplace defined by multiple remote devices (endpoints), the security threat is greater than ever.<\/p>\n<p>Managed Device Attestation works to create a second boundary of trust around which device management solutions can work to protect against attack.<\/p>\n<p>This is one of a wide and growing range of security enhancements coming to Apple\u2019s platforms, including <a href=\"https:\/\/www.computerworld.com\/article\/3663052\/wwdc22-apple-brings-declarative-device-management-to-the-mac.html\">declarative device management<\/a>, <a href=\"https:\/\/www.applemust.com\/wwdc-what-is-rapid-security-response-and-how-to-enable-it\/\" rel=\"noopener nofollow\" target=\"_blank\">Rapid Security Response<\/a>, and <a href=\"https:\/\/www.computerworld.com\/article\/3663430\/wwdc-apple-cloudflare-fastly-plot-the-end-of-captcha.html\">Private Access Tokens<\/a>. All these solutions represent Apple\u2019s work to deliver rock-solid security in such a way as to also improve the user experience.<\/p>\n<p>It\u2019s all about philosophy. Apple understands that security must evolve beyond traditional perimeter protections such as VPNs or firewalls. Protection must be put in place across the edge of the network and needs to become increasingly autonomous. After all, protection can\u2019t be wholly reliant on the data flow between device and server, as even that communication can be undermined.<\/p>\n<p>Managed Device Attestation forms a proof point to help secure the device and confirm its identity. Think of it this way \u2013 you as a user may have proved who you are, and you may be in a location that your management systems see as viable \u2013 but how do you prove you are using a registered device?<\/p>\n<p>That\u2019s what Managed Device Attestation seeks to do. It requires only that you trust the Secure Enclave on your device processor, and that you also trust Apple to attest to the status of the device.<\/p>\n<p>Essentially, the highly secured process shares key identity and other characteristics of the device as evidence with which to reassure the service that the device is one it can support. The Secure Enclave provides evidence to Apple\u2019s attestation servers that the hardware is legitimate, Apple shares this with the service, and because the service trusts Apple the device is seen as legitimate.<\/p>\n<p>The idea is to protect against use of compromised devices, situations in which an attacker is spoofing a service by pretending to be a legitimate device, or against attempts to access the network conducted by people who may have the users details but are working from an unrecognized device.<\/p>\n<p>While you\u2019ll need to <a href=\"https:\/\/developer.apple.com\/videos\/play\/wwdc2022\/10143\/\" rel=\"noopener nofollow\" target=\"_blank\">dig deep to get to grips with the technology behind the system<\/a>, a zoomed-out explanation follows:<\/p>\n<p>At its simplest, when you want your device authorized and request permission to do so, the device sends key information such as user or device identity to the service to confirm it is who it claims to be. This information is secured, of course, and works via an Apple server.<\/p>\n<p>The service looks at what it&#8217;s been told, compares it to its own records, verifies the message is genuine (as in signed and delivered by Apple\u2019s servers) and approves access. Attestation works thanks to MDM servers and the company\u2019s Automatic Certificate Management Environment (ACME) protocol, which makes attestation available to services beyond MDM.\u00a0<\/p>\n<p>Managed Device Attestation will be available for iOS 16, iPad OS 16 and tvOS 16 as the new operating systems appear over the coming weeks. MDM providers such as Jamf will certainly embrace support for this once it appears.<\/p>\n<p>Apple developers can find out more about Managed Device Attestation at the <a href=\"https:\/\/developer.apple.com\/videos\/play\/wwdc2022\/10143\/\" rel=\"noopener nofollow\" target=\"_blank\">WWDC 2022 session<\/a> that explains it and within this extensive <a href=\"https:\/\/developer.apple.com\/documentation\/devicemanagement\" rel=\"noopener nofollow\" target=\"_blank\">Device Management roundup<\/a> on Apple&#8217;s developer site.<\/p>\n<p><em>Please follow me on\u00a0<a href=\"https:\/\/twitter.com\/jonnyevans_cw\" rel=\"nofollow noopener\" target=\"_blank\">Twitter<\/a>, or join me in the\u00a0<a href=\"https:\/\/mewe.com\/join\/appleholics_bar_and_grill\" rel=\"nofollow noopener\" target=\"_blank\">AppleHolic\u2019s bar &amp; grill<\/a>\u00a0and\u00a0<a href=\"https:\/\/mewe.com\/join\/apple_discussions\" rel=\"nofollow noopener\" target=\"_blank\">Apple Discussions<\/a>\u00a0groups on MeWe.<\/em><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3671132\/what-is-managed-device-attestation-on-apple-platforms.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/idge\/imported\/imageapi\/2022\/06\/06\/11\/wwdc-2022-main-hero-100928697-large.3x2.jpg?auto=webp&amp;quality=85,70\"\/><\/p>\n<p><strong>Credit to Author: Jonny Evans| Date: Fri, 26 Aug 2022 09:43:00 -0700<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p>Announced at <a href=\"https:\/\/www.computerworld.com\/article\/3663681\/how-apple-improved-enterprise-deployments-at-wwdc.html\">WWDC 2022<\/a>, Managed Device Attestation protection shows that Apple is adjusting device security protections to adapt to an increasingly distributed age.<\/p>\n<h2><strong>Secure the endpoints, not the end times<\/strong><\/h2>\n<p>This adjustment reflects a reality shift. Work doesn\u2019t happen on specific servers or behind defined firewalls today. VPN access can differ across teams. And yet, in a workplace defined by multiple remote devices (endpoints), the security threat is greater than ever.<\/p>\n<p>Managed Device Attestation works to create a second boundary of trust around which device management solutions can work to protect against attack.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3671132\/what-is-managed-device-attestation-on-apple-platforms.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[2211,11198,10480,12555,714],"class_list":["post-19958","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-apple","tag-endpoint-protection","tag-ios","tag-mobile-device-management","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19958","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=19958"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19958\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=19958"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=19958"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=19958"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}