An adversary with physical access to a mobile device may seek to bypass the device’s lockscreen. Several methods exist to accomplish this, including:
ID | Name | Description |
---|---|---|
S1094 | BRATA |
BRATA can request the user unlock the device, or remotely unlock the device.[5] |
S1092 | Escobar |
Escobar can request the |
ID | Mitigation | Description |
---|---|---|
M1012 | Enterprise Policy |
Enterprises can provision policies to mobile devices that require a minimum complexity (length, character requirements, etc.) for the device passcode, and cause the device to wipe all data if an incorrect passcode is entered too many times. Both policies would mitigate brute-force, guessing, or shoulder surfing of the device passcode. Enterprises can also provision policies to disable biometric authentication, however, biometric authentication can help make using a longer, more complex passcode more practical because it does not need to be entered as frequently. |
M1001 | Security Updates |
OS security updates typically contain exploit patches when disclosed. |
ID | Data Source | Data Component | Detects |
---|---|---|---|
DS0013 | Sensor Health | Host Status |
Mobile security products can often alert the user if their device is vulnerable to known exploits. |