Skip to main content

018: Review security, compliance, resource access requirements (Certs/Wi-Fi/VPN)

Overview

Options for Certificates, Wi-Fi, and VPN for MDM for iOS in Intune

When managing iOS devices with Microsoft Intune, you have several options for configuring certificates, Wi-Fi, and VPN settings. These configurations are crucial for ensuring secure and seamless access to corporate resources. Here’s a detailed look at the available options, their benefits, and how they contribute to a Zero Trust security posture.

Certificates

Options:

  1. Simple Certificate Enrollment Protocol (SCEP):

  2. Public Key Cryptography Standards (PKCS):

  3. Imported PKCS Certificates:

Benefits:

Wi-Fi

Options:

  1. Basic Wi-Fi Configuration:

  2. Enterprise Wi-Fi Configuration:

Benefits:

  • Automated Connectivity: Ensures devices automatically connect to the corporate Wi-Fi network.
  • Improved Security: Enterprise configurations provide stronger security through certificate-based authentication.
  • User Productivity: Reduces the need for manual Wi-Fi configuration by users.

VPN

Options:

  1. Per-App VPN:

  2. Device-Wide VPN:

Benefits:

  • Secure Access: Ensures secure connections to corporate resources, even from remote locations.
  • Continuous Verification: Regularly updated VPN settings help maintain secure access.
  • Flexibility: Per-app VPN allows for granular control over which apps use the VPN.

Zero Trust Security Posture

Zero Trust is a security model that assumes no implicit trust and continuously verifies every access request. Here’s how these configurations align with Zero Trust principles:

  1. Verify Explicitly:

    • Certificates: Provide strong, certificate-based authentication, ensuring that only authorized users and devices can access resources.
    • Wi-Fi: Enterprise Wi-Fi configurations use certificates to authenticate devices, ensuring secure network access.
    • VPN: VPN profiles enforce secure connections, ensuring that only authorized devices can access the network.
  2. Use Least Privilege Access:

    • Per-App VPN: Limits VPN usage to specific apps, reducing the attack surface.
    • Conditional Access: Intune policies can enforce conditional access, ensuring that only compliant devices can access sensitive resources.
  3. Assume Breach:

By leveraging these configurations, organizations can enhance their security posture, streamline device management, and ensure compliance, all while adhering to the principles of Zero Trust.

Reference

(1) Types of certificate that are supported by Microsoft Intune. https://learn.microsoft.com/en-us/mem/intune/protect/certificates-configure. (2) Configure WIFI Profile using Intune |A Step-by-Step Guide | Microsoft Intune. https://www.youtube.com/watch?v=-edLIdPu-FE. (3) S01E33 - Configuring VPN Profiles with Microsoft Intune - (I.T). https://www.youtube.com/watch?v=5eZNwYB6DZ4. (4) Zero Trust with Microsoft Intune | Microsoft Learn. https://learn.microsoft.com/en-us/mem/intune/fundamentals/zero-trust-with-microsoft-intune. (5) Deployment guide: Manage iOS/iPadOS devices in Microsoft Intune. https://learn.microsoft.com/en-us/mem/intune/fundamentals/deployment-guide-platform-ios-ipados. (6) iOS/iPadOS device settings in Microsoft Intune | Microsoft Learn. https://learn.microsoft.com/en-us/mem/intune/configuration/device-restrictions-ios. (7) Create and Deploy Wifi profile in Microsoft Intune. https://www.youtube.com/watch?v=-jq90KneBxI. (8) Planning guide to move to Microsoft Intune | Microsoft Learn. https://learn.microsoft.com/en-us/mem/intune/fundamentals/intune-planning-guide.