[personal profile] mjg59
After my last post, someone suggested that having employers be able to restrict keys to machines they control is a bad thing. So here's why I think Bring Your Own Device (BYOD) scenarios are bad not only for employers, but also for users.

There's obvious mutual appeal to having developers use their own hardware rather than rely on employer-provided hardware. The user gets to use hardware they're familiar with, and which matches their ergonomic desires. The employer gets to save on the money required to buy new hardware for the employee. From this perspective, there's a clear win-win outcome.

But once you start thinking about security, it gets more complicated. If I, as an employer, want to ensure that any systems that can access my resources meet a certain security baseline (eg, I don't want my developers using unpatched Windows ME), I need some of my own software installed on there. And that software doesn't magically go away when the user is doing their own thing. If a user lends their machine to their partner, is the partner fully informed about what level of access I have? Are they going to feel that their privacy has been violated if they find out afterwards?

But it's not just about monitoring. If an employee's machine is compromised and the compromise is detected, what happens next? If the employer owns the system then it's easy - you pick up the device for forensic analysis and give the employee a new machine to use while that's going on. If the employee owns the system, they're probably not going to be super enthusiastic about handing over a machine that also contains a bunch of their personal data. In much of the world the law is probably on their side, and even if it isn't then telling the employee that they have a choice between handing over their laptop or getting fired probably isn't going to end well.

But obviously this is all predicated on the idea that an employer needs visibility into what's happening on systems that have access to their systems, or which are used to develop code that they'll be deploying. And I think it's fair to say that not everyone needs that! But if you hold any sort of personal data (including passwords) for any external users, I really do think you need to protect against compromised employee machines, and that does mean having some degree of insight into what's happening on those machines. If you don't want to deal with the complicated consequences of allowing employees to use their own hardware, it's rational to ensure that only employer-owned hardware can be used.

But what about the employers that don't currently need that? If there's no plausible future where you'll host user data, or where you'll sell products to others who'll host user data, then sure! But if that might happen in future (even if it doesn't right now), what's your transition plan? How are you going to deal with employees who are happily using their personal systems right now? At what point are you going to buy new laptops for everyone? BYOD might work for you now, but will it always?

And if your employer insists on employees using their own hardware, those employees should ask what happens in the event of a security breach. Whose responsibility is it to ensure that hardware is kept up to date? Is there an expectation that security can insist on the hardware being handed over for investigation? What information about the employee's use of their own hardware is going to be logged, who has access to those logs, and how long are those logs going to be kept for? If those questions can't be answered in a reasonable way, it's a huge red flag. You shouldn't have to give up your privacy and (potentially) your hardware for a job.

Using technical mechanisms to ensure that employees only use employer-provided hardware is understandably icky, but it's something that allows employers to impose appropriate security policies without violating employee privacy.

Date: 2022-09-19 09:44 am (UTC)
From: (Anonymous)
Personally I approach it from the opposite point of view — I don't *want* work-related material on my personal devices, and I don't want personal information on work-related devices. I want these things to be separate... my only concession being the installation of the company 2FA app on my phone, since that's convenient and unintrusive.

Date: 2022-09-21 01:19 pm (UTC)
dewline: Text - "On the DEWLine" (Default)
From: [personal profile] dewline
Seconding this more and more myself. Upcoming contract through a temp company may thwart this preference for personal privacy on my part and IT security on my employers'.

Maintaining isolation of user data

Date: 2022-09-19 10:07 am (UTC)
From: (Anonymous)
Do you have any thoughts on maintaining isolation of user data, so that you can have systems that handle sensitive user data, but ensure no human has access to production systems or data, even the owners of the company?

Does it suffice to make sure that, for instance, all code that gets deployed in production must go through a repository whose controls require review by a separate person, and then someone triggers an *automated* deploy to production systems which requires keys that only exist within the automation?

I've seen many writeups about fragments of architectures with controls like that. Do you know of *full* documentation of an architecture like that, that handles user data with appropriate care while applying the controls *between* developers and production, rather than on developer systems?

What about multiple parties?

Date: 2022-09-19 01:30 pm (UTC)
From: (Anonymous)

The employer -> employee case naturally makes sense to have employer-provided hardware, but there are many cases where this is more complex or even falls down due to the different relationship between the "user" and the "service provider":

  1. Contractors (Similar to the employer -> employee, but who bares the cost of the devices?)
  2. Universities (Does every student/visitor/collaborator need to be provided their own device? This is going to be a larger issue with the rise of online proctoring of exams.)
  3. Multi-party projects (There's an employer -> employee relation, but how are conflicting policies resolved?)

Using technical mechanisms to control key use in these cases is much more problematic, given the devices are likely not owned or controlled by the "service provider" (especially when the user is stuck between an OS which wants one thing, and a provider which wants another).

Re: What about multiple parties?

Date: 2022-09-19 02:15 pm (UTC)
resuna: Chinese 'chop' of my name. (Default)
From: [personal profile] resuna
> Contractors (Similar to the employer -> employee, but who bares the cost of the devices?)

Yes. And the company pays for it one way or the other, either as a line item for the contractor's onboarding, or in the cost of the contract.

> Does every student/visitor/collaborator need to be provided their own device?

If the student/visitor/collaborator is doing something like working on personally identifiable information that belongs to the university, almost certainly. But in general I don't think that the school/student relationship usually matches the company/employee relationship Matthew is posting about.

For exam proctoring: they should be providing a secure chromebook or equivalent for the purpose instead of installing spyware on the student's own computer.

This also applies to mobile devices.

Date: 2022-09-19 02:08 pm (UTC)
resuna: Chinese 'chop' of my name. (Default)
From: [personal profile] resuna
Companies shouldn't give users the option of getting company mail or access company resources from their personal phone. If they need to access mail, they should be provided a company phone that the company can remote reset when they need to.

A previous company had that policy, but it doesn't seem to be common, and I have declined to set up company mail on my own device since then, because having your personal phone remote reset by the company tends to smart.

Re: This also applies to mobile devices.

Date: 2022-10-01 11:45 pm (UTC)
From: [identity profile] kevinkofler.wordpress.com
The employee-friendly approach there is to allow forwarding the mail to their personal e-mail account. At that point, there is no way the employer can remote-reset anything. (They can reset the company-provided mail archive as much as they wish, it will not really affect the employee because they cannot pull the forwards.)

Re: This also applies to mobile devices.

Date: 2022-10-02 12:08 am (UTC)
resuna: Chinese 'chop' of my name. (Default)
From: [personal profile] resuna
Allowing the employee to forward mail to a personal account kind of negates the purpose of controlling access to proprietary information that the remote reset was set up for in the first place.

That is, a company that is going to remote-reset a mobile device when terminating an employee is extremely unlikely to be take this employee-friendly approach.
Edited (Clarification.) Date: 2022-10-02 12:11 am (UTC)

Re: This also applies to mobile devices.

Date: 2022-10-02 12:41 am (UTC)
From: [identity profile] kevinkofler.wordpress.com

Allowing the employee to forward mail to a personal account kind of negates the purpose of controlling access to proprietary information that the remote reset was set up for in the first place.

Well, that is the point: The employer cannot remote-reset the devices used to access and/or store the e-mail because they do not even know which devices those are, let alone have any kind of access to them. And that is the way it should be.

Re: This also applies to mobile devices.

Date: 2022-10-02 01:00 am (UTC)
resuna: Chinese 'chop' of my name. (Default)
From: [personal profile] resuna
Any company that has the intention of remote-resetting employee devices used to receive mail is simply not going to allow bulk forwarding as policy.

Whether that's the way it should be or not is irrelevant. Any consistent IT policy that includes the former will be forced to prohibit the latter. If you want contacts outside or inside the company to send you personal mail, give them your personal email address.
Edited (Clarification.) Date: 2022-10-02 01:01 am (UTC)

Re: This also applies to mobile devices.

Date: 2022-10-02 01:16 am (UTC)
From: [identity profile] kevinkofler.wordpress.com

Well, as an employee, you should never accept or sign such a policy. In fact, remote-resetting employee-owned devices should be illegal (and in Europe, it probably is). And there is no way I am going to install any kind of spyware with such a backdoor on my devices (mobile or not), nor am I going to use a device that has such a thing out of the box (my PinePhone sure does not).

Re: This also applies to mobile devices.

Date: 2022-10-02 08:14 am (UTC)
resuna: Chinese 'chop' of my name. (Default)
From: [personal profile] resuna
I don't disagree, and (as I noted in my first comment) I made that exact same decision when I was asked: I just refused to get email on a mobile device unless they bought me one. Apparently being able to email me when I'm at the grocery store or whatever wasn't important enough for them to spend a few hundred bucks for a work phone.

Don't let the company own your mobile. But don't expect to be able to finagle a way around it.

Date: 2022-09-19 04:43 pm (UTC)
ewx: (Default)
From: [personal profile] ewx
My employer and I also prefer total separation (with the exception, as above, of 2FA apps, which are no more of a risk than anything else I might realistically get from an app store, for whatever that might be worth.

Bring your own OS

Date: 2022-09-19 05:10 pm (UTC)
From: (Anonymous)
I think limiting the discussion to hardware only paints a partial picture. I use an employer-owned Dell laptop. But I don't run Windows or even Linux. I wonder if at least part of the discussion would benefit from talk of the software side: bring your own OS. Or, "bring your own entire software stack."

Date: 2022-09-19 07:02 pm (UTC)
squirrelitude: (Default)
From: [personal profile] squirrelitude
"BYOD" has at least three different meanings:

1. Occasionally checking mail/calendar/chat (all browser-based) from a personal device
2. Using an existing personal-use device for employer work
3. Using a spare device, with no personal data, for employer work

The first situation isn't even called "BYOD" any more, although I think it used to be.

The second situation sounds like trouble, and I don't understand people who want that.

But I'm in the situation of wanting to do the third -- I have a spare Thinkpad that's in great shape but that I don't use at all; I'd much prefer to use that for work than for anything that IT is currently capable of procuring for me. (They have very limited vendor agreements.) There's no personal info on it at all, as it has been wiped, and it would be wiped again on termination. However, IT is allergic to this idea.

It's possible I'm just weird in being in this situation, but I have trouble believing there are *that* few software developers with spare computers and preferences about them.
Edited (added new first item to list, renumbered others) Date: 2022-09-19 07:03 pm (UTC)

Date: 2022-09-19 08:23 pm (UTC)
From: (Anonymous)
You're not alone but there aren't many people like us. We are weird. :-/

Situation 2

Date: 2022-10-01 11:55 pm (UTC)
From: [identity profile] kevinkofler.wordpress.com

The second situation sounds like trouble, and I don't understand people who want that.

Because they have one fixed desktop computer on their one desk on which they do everything, work or not?

Because they do work and non-work activities in rapid succession, or even (at least in some cases) simultaneously (e.g., quickly checking personal mail while their code is compiling (https://xkcd.com/303/))?

Because they have more than one employer and do not want to end up with 3+ computers?

There are plenty of situations in which having to switch to a different computer for work is unhelpful. (In case you wonder: some of them affect me personally, some do not.)

Re: Situation 2

Date: 2022-10-02 04:33 pm (UTC)
squirrelitude: (Default)
From: [personal profile] squirrelitude
Because they have one fixed desktop computer on their one desk on which they do everything, work or not?


You're picturing an employer sending someone a desktop computer that they will use for full-time working from home?

Because they do work and non-work activities in rapid succession, or even (at least in some cases) simultaneously (e.g., quickly checking personal mail while their code is compiling (https://xkcd.com/303/))?


This one's actually plausible, although I usually think of people picking up their smartphone to do the personal stuff.

Because they have more than one employer and do not want to end up with 3+ computers?


This sounds like a contractor, who would be working from their *own* computer... not one managed by the employers.

Re: Situation 2

Date: 2022-10-03 08:55 pm (UTC)
From: [identity profile] kevinkofler.wordpress.com

You're picturing an employer sending someone a desktop computer that they will use for full-time working from home?

No, I am talking about someone using their own desktop computer instead of a company-provided notebook (which is actually something I do).

See the original post:

2. Using an existing personal-use device for employer work

And as for:

This sounds like a contractor, who would be working from their own computer... not one managed by the employers.

That is exactly my point. (But you do not have to be a contractor to want to use your own computer for work. I am not.)

The third is a bit risky.

Date: 2022-10-02 12:14 am (UTC)
resuna: Chinese 'chop' of my name. (Default)
From: [personal profile] resuna
I lost a laptop to company security policies that way.

Re: The third is a bit risky.

Date: 2022-10-02 03:56 pm (UTC)
squirrelitude: (Default)
From: [personal profile] squirrelitude
How, though? The company would at most have rights to the hard drive.

Re: The third is a bit risky.

Date: 2022-10-02 05:53 pm (UTC)
resuna: Chinese 'chop' of my name. (Default)
From: [personal profile] resuna
I don't know if it was malice or incompetence but it was one thing after another. I'd been marched out and they said they'd ship everything to me and I eventually got a bunch of bankers boxes full of the stuff from my desk. But the laptop wasn't there. They finally found it somewhere other than my desk, and then it couldn't boot up so they could wipe it, and after a few go-rounds I eventually gave up on it. It was a pretty old device, it still had a physical serial port. Actually I'd mostly been holding on to it because that was more reliable when dealing with serial consoles than a USB serial dongle.

Date: 2022-09-19 08:03 pm (UTC)
From: (Anonymous)
I don't think that hosting user data is the only scenario that an employer might need to worry about. Developers’ machines might also contain keys that allow them to publish to version control or package repositories. If these keys are compromised, it can lead to customers’ computers or data being compromised.

Assume compromise in either case

Date: 2022-09-20 04:45 pm (UTC)
From: (Anonymous)
I think you want to assume that either type of device will occasionally be compromised,
then create your mitigation strategies accordingly. With that approach, it doesn't
really matter if it's an uncontrolled device on the other side.

Date: 2022-09-21 02:09 pm (UTC)
redbird: closeup of me drinking tea, in a friend's kitchen (Default)
From: [personal profile] redbird
Another case that anyone who wants to do BYOD should be considering: the household with two (or more) people who share a device, and work for different organizations. What security does each employer need, or want, to ensure that the other employer doesn't have access to its data?

If employer A detects a security problem somewhere on its network, is employer B notified? And what else happens: does the housemate who works for B suddenly lose access, because employer A has the physical device and is scanning it for malware? Is B going to get enough information to protect itself, or is Alice just told to bring her machine to IT, she'll get it back in a few days and is on vacation until then?

Similarly, is the simple fact that each company can demand physical access to the machine a security problem for the other?

Along similar lines, it's a lot easier to require each employee to have their own device rather than share with someone else who lives there, than to be sure nobody will give access to a visiting friend or relative who wants to check their email, or check in for their flight home, because people don't always think in computer security terms. We think of being able to trust people in terms of deliberate harm, or avoiding risks that we're aware of, but "I can trust my brother" can mean I'm sure he wouldn't steal from me, or otherwise try to harm me--not that he won't do something risky, or that could endanger me, without realizing it or because we have different levels of risk tolerance.

Date: 2022-09-21 06:33 pm (UTC)
mellowtigger: (penguin coder)
From: [personal profile] mellowtigger
We were supposed to NOT mess with home networking at my last job. Rules softened during pandemic restrictions, because we had to. Even so, we weren't ever supposed to mess with the home wifi settings.

So guess what was required to fix a recurring problem? I'm certain there was an IP collision with our corporate network in both ip4 and ip6. I disabled ip6 on the laptop, but on the home router I had to switch some of them from 10.x.x.x space to 192.168.x.x instead. Some isps were configuring home routers in that larger "business" address space. Making this change always fixed the random outage issues that some people would experience inconsistently. I never had anyone already in 192.168.x.x space show the problem. In this case, "Business B" was the isp itself, and their standards interfered with our own.

Date: 2022-09-21 06:27 pm (UTC)
mellowtigger: (penguin coder)
From: [personal profile] mellowtigger
For work-from-home situations, I very much like the idea of a virtual desktop as a new standard. Use a company-provided source or a user-provided source at home. You don't need to care (as much) about the safety of that remote hardware, if the remote access to the virtual environment is controlled and monitored. Within the physical office space, however, go hardcore business-owned equipment only. Cell phones in the office are bad enough.

Date: 2022-09-21 10:35 pm (UTC)
armiphlage: Ukraine (Default)
From: [personal profile] armiphlage
My employer permits BYOD. I started to set up my tablet so I could access work email while on vacation. I then had to agree that my employer could remotely wipe and/or brick my device (including my personal photos and other non-work-related data and apps) for any reason, not including them terminating my employment. I didn't complete the BYOD setup.

Reasons I use only one device

Date: 2022-09-22 07:04 am (UTC)
From: (Anonymous)

I totally agree with the downsides listed by the post as well as the different comments. However there are several reasons why I still stick with using one device only. I would be very interested in suggestions on how to avoid these problems or contain the downsides:

  1. Using a separate device for each context does not scale. I am involved in several contexts: My main job, my side-job, a volunteer project, my home/family. Trying to separate data for all of these means I'd need 4 devices.

  2. I really like working in the environment I am familiar with and have configured according to my personal preferences. Even for the simple case of Work/Private separation, I would need to maintain 2 identical base systems. Repeating each config and fixing each problem twice. I don't think this is a good use of my time.

  3. My work is very flexible, so time-wise there is no hard separation between work and private. I regularly spend a few hours at home for work or a few hours at work for private/volunteer tasks. (e.g. because a meeting is scheduled in a slot that otherwise belongs to the "other" context). So separating devices would mean carrying two devices all the time.

easy solution

Date: 2022-09-24 11:24 pm (UTC)
From: (Anonymous)
use an external storage device (SSDs works best) with your company OS stack.
This device can be used with your device or optional with company PCs.
It has also the advantage of not carrying a laptop to your work/home and if you change your job, you can easily separate company data from private data.

Reply from the "someone" cited in the post

Date: 2022-10-01 11:28 pm (UTC)
From: [identity profile] kevinkofler.wordpress.com

If I, as an employer, want to ensure that any systems that can access my resources meet a certain security baseline (eg, I don't want my developers using unpatched Windows ME), I need some of my own software installed on there. And that software doesn't magically go away when the user is doing their own thing.

Obviously, I do not consider that acceptable at all, either. I also consider it unacceptable when proprietary game developers do that against cheating, and I consider it just as unacceptable when employers do it in the name of "security". I am not going to install this kind of spyware on my computer.

(By the way, that kind of "checking" spyware cannot even necessarily be relied on, because some of that spyware can be circumvented, e.g., the OpenConnect client can fake Cisco's "security check" software and make the server believe that you are running the expected Windows setup. And needless to say, I consider it a good thing that OpenConnect can do that. Though thankfully I do not need such hacks because my employer uses the FOSS ocserv.)

And if your employer insists on employees using their own hardware

Here in Austria, since last year when a new home office law was passed, that is actually not allowed (at least for employees working from home), in the sense that employers are now disallowed from requiring employees to use their own hardware. The employers have to offer providing company-owned hardware for employees. But, at least as far as the government is concerned, the employees are not required to accept that offer. If both sides are happy with BYOD, the law does not prevent that.

At the company I work for, this has always been the policy: If you need a company notebook, you will get one, but if you prefer to use your own computer (or even a computer owned by a third party such as the university with which we cooperate), that is fine too. I actually use a desktop tower most of the time, not a notebook. (And both the desktop tower and the notebook are owned by me.)

Device separation

Date: 2023-01-08 09:45 am (UTC)
From: (Anonymous)

Thinking about Android, where I have two profiles - Personal and Work. While my employer can monitor / reset / wipe Work profile, they have almost zero access to my Personal profile. Sounds like win-win for me and employer? The only restriction that company force is to have strong passwords on Android device itself. Over the weekend / holiday I have an option to "pause" work profile which in fact will temporarily disable all the communication between my Work profile and employer.

Second very common option is utilizing VDI. Where employee can use whatever equipment (and whatever OS installed). But in order to get access to corporate resources one need first to connect to the VDI (providing passwords, OTP/MFA, etc). In such scenario data is not leaked to personal equipment outside of VDI - any copy/paste functionality are usually tightly controlled. I know that utilizing VDI will not work for everyone.

Profile

Matthew Garrett

About Matthew

Power management, mobile and firmware developer on Linux. Security developer at nvidia. Ex-biologist. Content here should not be interpreted as the opinion of my employer. Also on Mastodon and Bluesky.

Expand Cut Tags

No cut tags