Samsung Knox

Samsung Knox is a proprietary security framework pre-installed on most Samsung mobile devices. Its primary purpose is to provide organizations with a toolset for managing work devices, such as employee mobile phones or interactive kiosks.[2] Knox provides more granular control over the standard work profile to manage capabilities found only on Samsung devices.[3]

Samsung Knox
Developer(s)Samsung Group
Initial releaseMarch 2013 (2013-03)
Stable release
3.7 / 3 December 2020 (2020-12-03)[1]
Operating systemAndroid and Tizen
Websitewww.samsungknox.com/en

Knox's features fall within three categories: data security, device manageability, and VPN capability.[4] Knox also provides web-based services for organizations to manage their devices. Organizations can customize their managed mobile devices by configuring various functions, including pre-loaded applications, settings, boot-up animations, home screens, and lock screens.[5]

As of December 2020, organizations can use specific Samsung mobile device cameras as barcode scanners, using Knox services to capture and analyze the data.[6]

Overview

Samsung Knox provides hardware and software security features that allow business and personal content to coexist on the same device. Knox integrates web services to assist organizations in managing fleets of mobile devices, which allows IT administrators to register new devices, identify a Unified Endpoint Management (UEM) system, define the organizational rules that govern the use of devices, and upgrade device firmware over-the-air.[7] Developers can integrate these features with their applications using Knox SDKs and REST APIs.[8]

Services

Samsung Knox provides the following web-based services for organizations:

  • To manage mobile devices: Knox Suite, Knox Platform for Enterprise, Knox Mobile Enrollment, Knox Manage, and Knox E-FOTA.[7]
  • To customize and rebrand devices: Knox Configure[9]
  • To capture data: Knox Capture[10]

These services are registered and accessed through web consoles.[11]

Container

When Samsung Knox debuted with the Galaxy S3 in 2013, it included a proprietary container feature that stored security-sensitive applications and data inside a protected execution environment.[12] Device users could switch between personal and business applications by tapping a Knox icon in the lower-left corner of the device screen.[13] The proprietary container, later called the Knox Workspace, was managed by organizations through a UEM system.[14]

Samsung then spun off consumer versions of the container feature, which did not require a UEM system to manage. These consumer versions included Personal Knox, later called My Knox starting in 2014. My Knox was replaced by Secure Folder in 2017.[15]

In 2018, Samsung partnered with Google to use its Android work profile to secure applications and data, and in 2019 deprecated the Knox Workspace container.[16] Samsung continues to pre-install the Secure Folder on most flagship mobile devices, but consumers must enable it for use.[17]

Samsung Real-Time Kernel Protection (RKP)

The Samsung RKP feature tracks kernel changes in real-time and prevents the phone from booting, as well as displaying a warning message about using "Unsecured" Samsung devices. This feature is analogous to Android dm-verity/AVB and requires a signed bootloader.[18]

Security Enhancements for Android (SE for Android)

Although Android phones are already protected from malicious code or exploits by SE for Android and other features, Samsung Knox provides periodic updates that check for patches to further protect the system.[19]

Secure Boot

During Secure Boot, Samsung runs a pre-boot environment to check for a signature match on all operating system (OS) elements before booting in the main kernel. If an unauthorized change is detected, the e-fuse is tripped and the system's status changes from "Official" to "Custom".

Other features

Several other features that facilitate enterprise use are incorporated in Samsung Knox, including Samsung KMS (SKMS) for eSE NFC services, Mobile device management (MDM), Knox Certificate Management (CEP), Single Sign-On (SSO), One Time Password (OTP), SIM PIN Management, Firmware-Over-The-Air (FOTA)[20] and Virtual Private Network (VPN).[21][22][23][24]

Samsung has patched the kernel to prevent root access from being granted to apps even after rooting was successful since the release of Android Oreo. This patch prevents unauthorized apps from changing the system and deters rooting.[25]

Hardware

Knox includes built-in hardware security features ARM TrustZone (a technology similar to TPM) and a bootloader ROM.[26] Knox Verified Boot monitors and protects the phone during the booting process, along with Knox security built at a hardware level (introduced in Knox 3.3).

e-Fuse

Rooted Samsung Galaxy S10e with tripped e-fuse

Samsung Knox devices use an e-fuse to indicate whether or not an "untrusted" (non-Samsung) boot path has ever been run. The e-fuse will be set if the device boots with a non-Samsung signed bootloader, kernel, kernel initialization script, or data. When set, the text "Set warranty bit: <reason>" appears. Rooting the device or flashing a non-Samsung Android release also sets the e-fuse. Once the e-fuse is set, a device can no longer create a Knox Workspace container or access the data previously stored in an existing Knox Workspace.[27] In the United States, this information may be used by Samsung to deny warranty service to devices that have been modified in this manner.[28] Voiding consumer warranties in this manner may be prohibited by the Magnuson–Moss Warranty Act of 1975, at least in cases where the phone's problem is not directly caused by rooting.[29] In addition to voiding the warranty, tripping the e-fuse also prevents some Samsung-specific apps from running, such as Secure Folder, Samsung Pay, Samsung Health, and Samsung Browser's secret mode. For some older versions of Knox, it may be possible to clear the e-fuse by flashing a custom firmware.[30]

Samsung DeX

Options to manage Samsung DeX were added in Knox 3.3 to allow or restrict access using the Knox platform for added control and security.[31]

Samsung Knox TIMA

Knox's TrustZone-based Integrity Measurement Architecture (TIMA) allows storage of keys in the container for certificate signing using the TrustZone hardware platform.[32]

Notable security mentions

In June 2014, the Defense Information Systems Agency's (DISA) list of approved products for sensitive but unclassified use included five Samsung devices.[33]

In October 2014, a security researcher discovered that Samsung Knox stores PINs in plain text rather than storing salted and hashed PINs and processing them by obfuscated code.[34]

In October 2014, the U.S National Security Agency (NSA) approved Samsung Galaxy devices for use in a program for quickly deploying commercially available technologies. Approved products include Galaxy S4, Galaxy S5, Galaxy S6, Galaxy S7, Galaxy Note 3, and Galaxy Note 10.1 2014.[33]

In May 2016, Israeli researchers Uri Kanonov and Avishai Wool found three vulnerabilities in specific versions of Knox.[35]

In December 2017, Knox received "strong" ratings in 25 of 28 categories in a Gartner publication comparing device security strength of various platforms.[36]

References

  1. "What's new in Knox 3.7". Samsung Knox Team. 3 December 2020. Retrieved January 3, 2021.
  2. "Secure mobile platform and solutions". Samsung Knox. January 15, 2021. Archived from the original on December 23, 2020. Retrieved January 15, 2021.
  3. "App Container | Knox Platform for Enterprise White Paper". docs.samsungknox.com. Retrieved 2021-01-07.
  4. "Samsung Knox Feature Summary". docs.samsungknox.com. Retrieved 2021-01-06.
  5. "8 Steps to Customizing Mobile Devices With Knox Configure". Samsung Business Insights. 2020-01-07. Retrieved 2021-01-06.
  6. Miller, Matthew. "Samsung Galaxy XCover Pro: Microsoft Teams Walkie Talkie experiences and Knox Capture release". ZDNet. Retrieved 2021-01-06.
  7. "Knox for Enterprise Mobility". Samsung Knox. Retrieved 2021-01-06.
  8. "Knox Developer Documentation". docs.samsungknox.com. Retrieved 2021-01-06.
  9. "Knox for Device Customization". Samsung Knox. Retrieved 2021-01-06.
  10. "Knox Capture". Samsung Knox. Retrieved 2021-01-06.
  11. "Samsung Knox Documentation | Ecosystem". docs.samsungknox.com. Retrieved 2021-01-06.
  12. "New Samsung Galaxy Note 3 software features explained". Android Authority. 2013-09-04. Retrieved 2021-01-07.
  13. Ziegler, Chris (2013-02-25). "Samsung Knox: a work phone inside your personal phone (hands-on)". The Verge. Retrieved 2021-01-07.
  14. "Evaluating top MDMs for Android and iOS". SearchMobileComputing. Retrieved 2021-01-07.
  15. "Samsung discontinues My Knox, urges users to switch to Secure Folder". Android Authority. 2017-06-02. Retrieved 2021-01-07.
  16. "What's new in Knox 3.4?". Samsung Knox. Retrieved 2021-01-07.
  17. "What is the Secure Folder and how do I use it?". Samsung uk. Retrieved 2021-01-07.
  18. "Samsung RKP".
  19. "What is SE for Android? | Samsung Support Philippines". Samsung ph. Retrieved 2021-01-04.
  20. "Samsung Enterprise Firmware-over-the-air".
  21. "Samsung SSO".
  22. "Samsung CEP".
  23. "Samsung OTP".
  24. "Samsung Knox VPN".
  25. "Disable DEFEX Security to Root Samsung Galaxy Devices on Oreo".
  26. "Root of Trust | Knox Platform for Enterprise Whitepaper". docs.samsungknox.com. Retrieved 2018-11-13.
  27. Ning, Peng (2013-12-04). "About CF-Auto-Root". Samsung. Archived from the original on 2015-09-05. The sole purpose of this fuse-burning action is to memorize that a kernel or critical initialization scripts or data that is not under Samsung's control has been put on the device. Once the e-fuse bit is burned, a Samsung KNOX-enabled device can no longer create a KNOX Container or access the data previously stored in an existing KNOX Container.
  28. "Just how does Knox warranty void efuse burning work?". XDA Developers Forums. Retrieved 2021-01-05.
  29. Koebler, Jason (2016-08-17). "Companies Can't Legally Void the Warranty for Jailbreaking or Rooting Your Phone". Motherboard. Retrieved 2018-10-27.
  30. "Disable Knox on Samsung Galaxy Devices [4 Ways] | Android More". AndroidMore. Retrieved 2020-12-14.
  31. "Samsung DeX | Apps & Services | Samsung IN". Samsung India. Retrieved 2021-01-04.
  32. "Samsung TIMA Keystores".
  33. Ribeiro, John (2014-10-21). "NSA approves Samsung Knox devices for government use". PCWorld. Retrieved 2018-10-27.
  34. Mimoso, Michael (2014-10-24). "NSA-Approved Samsung Knox Stores PIN in Cleartext". Threatpost. Retrieved 2018-10-27.
  35. Forrest, Conner (2016-05-31). "Samsung Knox isn't as secure as you think it is". TechRepublic. Retrieved 2018-10-27.
  36. "Introduction | Knox Platform for Enterprise Whitepaper". docs.samsungknox.com. Retrieved 2018-11-13.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.