Guide

Best Practices for Deploying XR:
IT & Security Considerations

In today’s rapidly evolving tech landscape, virtual reality is transforming the way organizations train employees, however this has brought with it a number of new security & IT-related considerations.

XR IT & Security Deployment

KEY TAKEAWAYS for XR IT & Security Deployment

XR IT & Security Deployment Best Practices

VR Training

In today’s rapidly evolving tech landscape, virtual reality is transforming the way organizations train employees, however this has brought with it a number of new security & IT-related considerations. This whitepaper explores best practices for IT and security professionals to successfully implement XR technology in their organizations.

We will review all the elements of network design, device management and deployment, data security, and compliance standards. The purpose of this white paper is to define the core components that need to be considered when adopting VR into the enterprise, as well as best practices around SecOps, networking and IT. ​XR IT & Security Deployment have come a long way in this rapidly changing landscape, so read on and stay informed with the latest.

Deployment Components

deployment

A successful VR training deployment for enterprise customers involves several key components. First, the hardware includes VR headsets, such as standalone devices (e.g., Meta Quest or Pico), along with necessary accessories like controllers, charging docks, and spatial sensors.

The deployment also requires an IT setup, ensuring a stable network, bandwidth, and cloud infrastructure to manage large-scale, immersive content. LMS integration is critical for syncing the VR training platform with existing learning management systems, allowing for seamless data flow, progress tracking, and reporting.

Additionally, deployment often involves software installation and user training, ensuring that employees can effectively use the system. Ongoing maintenance and support are also essential for troubleshooting, updates, and scaling the solution as needed. These components work together to provide a fully integrated, scalable VR training solution.

VR Hardware​

Standalone vs PC Powered

XR Security & IT Deployment

Choosing the right type of VR headset for your business often comes down to deciding between standalone or PC-powered devices. Standalone VR headsets—such as the Meta Quest’s, HTC Vive Focus, Pico Neo series — are completely self-contained.

There’s no need to connect them to a PC, which makes them easier to set up, manage, and update. All content distribution and software updates can be handled through a cloud-based management platform. Built-in security features let your IT team enforce usage policies, control user access, and remotely monitor the devices. Because these headsets operate independently, they have fewer connection points and therefore fewer potential security weak spots.

By contrast, PC-powered VR headsets depend on an external computer and often require platforms like Meta’s Quest for Business software. While this can sometimes deliver more advanced capabilities, it also means you’re relying on Windows operating systems and network credentials—factors that must be carefully managed to avoid security issues.

Distributing and updating VR training content in this setup is more involved because you have to synchronize both the headset and the PC. This creates a more complex environment with a larger attack surface. As a result, maintaining security compliance requires consistent patch management, strict access controls, and other robust security measures.

VR Device Security

Lock

Ensuring the security of VR devices is crucial for organizations that utilize shared, or single-user VR headsets in immersive training environments. This involves managing physical access to devices through secure cabinets and implementing strict controls over USB debugging, which is vital during development but can introduce vulnerabilities if not properly managed post-deployment.

Standalone VR devices come equipped with several security features that help protect user data and maintain device integrity. This section explores essential practices in VR device security, highlighting the importance of physical security measures, USB debugging, and the utilization of Android’s security protocols to safeguard the hardware.

To enhance VR headset security, it’s crucial to implement secure storage practices by placing locked cabinets near each training location. These cabinets should house the headsets and be accessible only to authorized trainers and managers. Locking keys within the cabinets ensures that only designated personnel can retrieve the equipment, preventing unauthorized use and safeguarding the valuable devices. This controlled access minimizes the risk of theft or damage, maintaining the integrity of training sessions.

USB

For VR Development, USB debugging is typically always used to do iterative development and perform quick quality assurance and testing on all applications and modules. The method of connecting the VR device to your computer is through USB debugging on all forms of Android devices and is typically only allowed through the device OS software or an MDM. If USB debugging is on, once connected to a device it will ask the user if it can be trusted and then provides a major amount of access to the device. Of course, this requires physical access to the device, but once allowed, connected and trusted a user has access to:

To secure the device, USB debugging should be turned off once deployed and is enforced through an MDM so that the device has no way to turn it back on without authorization from the MDM. USB debugging can be extremely useful during development, but post deployment it should only be used by authorized users under specific circumstances to avoid any insecure access. 

Android

All standalone VR Devices utilize Android as their OS therefore, they inherit its secure OS. These standard security features provide enhanced security on the OS level:

Penetration testing is performed by each Hardware providers third party vendor to ensure there are no security vulnerabilities and these vary per provider. Each provider is responsible for detection and remediation of vulnerabilities on their hardware and software. They will leverage many tools to detect any security bugs in the device code base to mitigate any issues before being shipped. These are also being reviewed by the hardware providers and updates to the devices will also fix any security vulnerabilities or bugs found. 

Each hardware provider will have their own security whitepaper, with their own security best practices, but they all follow similar standards to ISO 27001 and SOC 2. These whitepapers provide great insight into the practices followed by the providers, and it is useful to keep a saved copy of the provider being used. To avoid vulnerabilities, we advise having one hardware provider of choice.

Network Security

The VR devices being attached to an internet connection and network is a typical requirement for all enterprise deployments, especially with updates to the applications, software on the headsets and to allow device management. How these networks handle the VR devices depends on each deployment but there are best standards that will maximize quality and minimize security issues.

Most if not all enterprises will do a full deployment across multiple locations, with hundreds or thousands of users sharing these devices.  

Each VR Device will have its own specific networking requirements addressed by the hardware provider, but there are some standards that should be followed for all devices to have the best connection possible with the least amount of down time.

Wi-Fi Bandwidth is the first major component and 5GHz is typically the best option for all VR devices on the market. 6GHz or 6E is also another bandwidth frequency that is being adopted by all major new devices on the market including Quest 3s which should be utilized by the AP. Make sure to disable all other bands if it is a dual bander router so that the devices are not bouncing between 2.5 / 5 / 6Ghz.

When looking at transfer speeds, we recommend for over 200Mbps when utilizing Multiplayer and heavy updates from the MDM. Applications are updated via an APK through an MDM, where the APK size can vary between 1-2GB. You want these updates to be pushed quickly and for the network to not be bottlenecked by bandwidth levels when updating hundreds of devices at a time on the network. Under typical daily use, 15MB data is the norm.

The AP should also not be a guest network or a tunneled network as this can cause drops or issues with the devices. A dedicated Wi-Fi should be created for these devices so that they are not sharing it with any other corporate devices on the network. 

Typically, corporate APs are set up per area so that devices can roam between the APs and never lose connection. Under some unique circumstances, Roaming can cause disconnections to some VR Devices as the device will attempt to connect to the stronger AP. There is no decisive setting for roaming and should be assessed on a case-by-case basis. 

Corporations will all use different DNS services, possibly through their ISP, through their AP / Firewall provider or private DNS. When assessing any connections issue on the device, the DNS may be an area to be analyzed and reviewed.

Lastly, MAC Filtering can be utilized if credentials are not an option and provides a very secure way, but outdated way to make sure only authorized devices with specific MAC addresses are allowed to be connected to the network. Android devices typically have their MAC addresses set to random upon connection to a network for security purposes, but this setting should be reverted to the Device MAC for MAC Filtering to function properly. 

Corporate firewalls are typically locked down tight to provide the best security possible, where the standard is: if the domain is not required, it is blocked. 

Firewall rules and exceptions are set in place to allow specific domains, IPs through on different ports such as TCP and UDP. Applications should stick to using Web Security Service (WSS) through TCP to provide the most secure transmission of data possible. 

There are no strict firewall rules or domains that need to be set up, as they can vary from every application and device out there. These domains are on a case-by-case basis and there are 5 pieces of information that will be required:

Examples of Endpoint List:

VR Application Security

As VR training programs become increasingly popular, the importance of effective application security is becoming paramount. Unlike traditional training tools, VR applications create immersive experiences that necessitate tailored security measures to protect user data and maintain the integrity of the learning environment. Key components of VR application security include app-level authentication, which ensures secure access through methods like Single Sign-On (SSO) and custom login; data protection, achieved through encryption protocols like TLS; and input validation, which mitigates security vulnerabilities such as injection attacks. By prioritizing these security measures, organizations can not only safeguard sensitive information but also create a seamless and engaging learning experience, fostering trust and effectiveness in immersive training environments.

Login Authenticator

Integrating secure authentication methods like Single Sign-On (SSO) and Custom Login into VR learning programs is crucial for ensuring both user convenience and data protection. These methods streamline access while maintaining stringent security measures tailored to the unique challenges of immersive VR environments.

Advantages of SSO and Custom Login in VR Learning Programs:

1. Enhanced Security Measures:

2. User Experience Optimization:

3. Compliance and Data Protection:

Data protection in VR training is essential for ensuring that the personal information of trainees, as well as sensitive business data, is secure. With VR experiences generating significant amounts of data related to user behavior, interactions, and performance, it is critical to secure both data in transit and at rest.

Data Protection in the Cloud:

1. Securing Data in Transit:

2. Securing Data at Rest:

3. Protecting Against Threats:

Login Authenticator

4. Implementing Best Practices:

In conclusion, data protection in the cloud involves securing data in transit and at rest through the enforcement of TLS, the use of strong cipher suites, and encryption practices. By implementing these measures, organizations can safeguard sensitive information, ensure compliance with regulatory standards such as SOC 2 and ISO 27001, and protect against unauthorized access and threats. Effective data protection strategies enhance the overall security of cloud-based systems, supporting the integrity and trustworthiness of cloud services.

In VR training environments, ensuring the security and reliability of user interactions and data is crucial. With features like Single Sign-On (SSO) for user access and Learning Record Store (LRS) for tracking progress, maintaining a solid foundation of security practices, such as input validation, becomes essential.

 

Why Input Validation Matters in VR Training Environments:

 

1. Preventing Security Risks:

2. Ensuring Stable Operations:

3. Protecting Data Integrity:

Effective input validation is vital in VR training environments to enhance security, maintain operational stability, and safeguard the accuracy of data captured and processed through SSO login integration and LRS functionalities. Implementing modern input validation practices helps mitigate security risks, improve user experience, and ensure the dependability of training data essential for evaluating performance and educational insights.

Cloud Security

When deploying VR training solutions, ensuring cloud security is crucial due to the involvement of multiple vendors and services. A typical deployment may include Mobile Device Management (MDM) providers, Learning Management Systems (LMS), Identity Providers (IdPs), backend services, and other third-party integrations. Each component must be carefully evaluated for security, as some may store or process sensitive data, including trainees’ personally identifiable information (PII).

To safeguard your VR training deployment, it’s important to break down and assess these core components individually. This approach allows you to identify potential security risks and implement appropriate measures to ensure compliance with data protection standards and maintain the integrity of your overall solution.

whitepaper security XR

API authentication is vital for securing interactions between VR clients (headsets, apps) and backend servers. In VR training, where immersive environments might integrate with learning management systems (LMS), identity providers (IdP), and tracking of user progress, securing API interactions is crucial to prevent unauthorized access to sensitive data such as user progress, assessment results, or personal information.

Importance and Benefits of API Authentication Using OAuth 2.0 and SAML:

1. Enhancing Security:

2. Enhancing User Experience:

3. Protecting Sensitive Data:

4. Supporting Audit and Accountability:

5. Implementing Best Practices:

IOS 27001

Implementing advanced API authentication protocols like OAuth 2.0 and SAML offers significant benefits in terms of security, user experience, and compliance with industry standards such as SOC 2 and ISO 27001. By leveraging these protocols, organizations can ensure access control, protect sensitive data, and maintain the integrity and trustworthiness of their cloud-based services. Effective API authentication enhances the overall security posture of cloud APIs, supporting the needs of users and aligning with high-security standards. 

Data protection in VR training is essential for ensuring that the personal information of trainees, as well as sensitive business data, is secure. With VR experiences generating significant amounts of data related to user behavior, interactions, and performance, it is critical to secure both data in transit and at rest.

Data Protection in the Cloud:

1. Securing Data in Transit:

2. Securing Data at Rest:

3. Protecting Against Threats:

data protection

4. Implementing Best Practices:

In conclusion, data protection in the cloud involves securing data in transit and at rest through the enforcement of TLS, the use of strong cipher suites, and encryption practices. By implementing these measures, organizations can safeguard sensitive information, ensure compliance with regulatory standards such as SOC 2 and ISO 27001, and protect against unauthorized access and threats. Effective data protection strategies enhance the overall security of cloud-based systems, supporting the integrity and trustworthiness of cloud services.

In the context of cloud APIs, validating incoming web requests and accompanying data is essential for maintaining security, data integrity, and reliability. This goes hand in hand with the application-level security measures. Proper data validation helps prevent security vulnerabilities, ensure accurate data processing, and comply with industry standards such as SOC 2 and ISO 27001.

Importance of Data Validation for Cloud APIs:

1. Enhancing Security:

2. Ensuring Data Integrity:

3. Implementing Best Practices:

In conclusion, data validation is a fundamental aspect of cloud API security and reliability. By implementing thorough validation practices, organizations can prevent security vulnerabilities, ensure data integrity, and comply with industry standards such as SOC 2 and ISO 27001. Effective data validation enhances the overall security posture of cloud APIs and ensures that data remains accurate and reliable, supporting the integrity and trustworthiness of cloud-based applications and services.

Monitoring and logging are critical for detecting security threats or anomalies within a VR training deployment. Detailed logs are essential for tracking both trainee interactions and system performance, ensuring that any suspicious activities or performance issues are caught early.

Importance and Benefits of Monitoring and Logging in the Cloud:

1. Enhancing Security:

2. Improving Operational Efficiency:

3. Supporting Incident Management:

4. Facilitating Continuous Improvement:

Monitoring and logging are essential practices for managing and securing cloud environments. By implementing comprehensive monitoring and logging strategies, organizations can enhance security, ensure compliance with SOC 2 and ISO 27001 standards, improve operational efficiency, and support effective incident management. These practices provide the visibility and insights needed to maintain the integrity, availability, and security of cloud-based systems, ensuring the reliability and trustworthiness of cloud services.

CDN Diagram

In cloud API architectures, employing a Content Delivery Network (CDN) offers multiple advantages that strengthen security, improve performance, and provide greater regional control. CDNs integrate key features such as rate limiting, OWASP firewall protection, and geolocation-based controls, all of which contribute to a more and resilient API infrastructure. These capabilities ensure a more secure and reliable user experience while helping maintain compliance with industry security standards.

Key Benefits of Using a CDN for Cloud APIs:

1. Rate Limiting:

2. OWASP Firewall Integration:

3. Regional Control:

In conclusion, employing a CDN in front of cloud APIs offers significant benefits in terms of security, performance, and regional control. Features such as rate limiting, OWASP firewall integration, and geofencing enhance the overall robustness of the API infrastructure, ensuring compliance with industry standards such as SOC 2 and ISO 27001. By leveraging the capabilities of a CDN, organizations can provide a secure, reliable, and efficient API service, supporting the needs of users and maintaining the integrity of cloud-based applications and services.

VR Training

A Virtual Private Cloud (VPC) can offer enhanced security for a VR training deployment by isolating the sensitive data related to user progress, training results, and backend services.

Key Benefits of Using a VPC for Cloud APIs:

1. Enhanced Security:

2. Data Protection:

3. Improved Network Management:

4. Scalability and Flexibility:

To summarize, using a Virtual Private Cloud (VPC) for cloud APIs offers significant benefits in terms of security, network isolation, data protection, and compliance with industry standards such as SOC 2 and ISO 27001. By leveraging the capabilities of a VPC, organizations can create a secure and scalable environment for their cloud APIs, ensuring protection for sensitive data and maintaining the integrity and availability of their cloud-based services. Implementing a VPC not only enhances security and compliance but also provides the flexibility and control needed to manage and scale API infrastructure effectively.

VR Training

Traditional MDM’s, even those used for Android are not able to function correctly with VR headsets due to the Launcher running on top of the Android OS, as well as the entirely different interface. For this reason, only a few MDMs exist that function well and properly with VR such as: ArborXR, ManageXR, Meta For Work (Paired with Microsoft Intune). These MDMs are specialized in working with many types of VR Devices. Adding VR to an enterprise, these MDM’s need to be added to the existing fleet of software to pair with the VR Devices and keep them secure.

In some cases, the MDM is managed by the Enterprise itself or the provider of the headsets or the Developer.

Device Configuration

The VR Devices follow typical MDM Configuration settings for Android:

Each MDM provides a unique experience on how the configurations function as well the User Experience for the MDM User. When working with VR Devices, there are tradeoffs that need to be made between UX and Security such as:

When developing VR, the MDM should be used to push updates and new content to the headsets for review by the Enterprise business. Instead of using typical USB installation means from the PC, the MDM can be used to push updates to numerous devices at once to be tested.

This means of User Testing and QA typically has the MDM managed by the developer and not the enterprise company to lower development time and bypass any hurdles during the development process.

VR Training

During the deployment stage, the MDM should undergo a change of management to the proper teams at the Enterprise, keeping only a few key members of the Development company. During this transition it is important to set the appropriate members from the IT and training team as MDM admins and to move all headsets to a deployment configuration. It is also important to renew all passwords to the Wi-Fi and devices to keep security updated and perform this renewal every 6-12 months.

When performing any additional updates or QA to the headsets whether it be OS updates, application updates or MDM, a separate Configuration should be used in isolation from the active devices to test properly any updates before deploying. This configuration can be called “Production Testing” and the configuration settings should be similar to the deployment configuration to perform the best QA.

The MDM’s also allow for different user permissions to be assigned which should be taken into consideration when adding new members to the MDM. These permissions allow for different users to access different services and settings across the MDM and should be applied accordingly to the enterprise standards. 

OTP (One Time Password)

Login Authenticator

In cybersecurity, one-time passwords (OTPs) are commonly used to secure access, but VR training environments introduce unique challenges. While device certificates help secure network connections on shared VR devices, an additional layer of user authentication is still essential. Many organizations use Azure Active Directory for single sign-on (SSO), which supports multi-factor authentication (MFA) and OTP. However, the best authentication method often depends on whether trainees have access to company devices, such as phones or laptops. In some cases, security exceptions may be needed to create a seamless training experience, while relying more heavily on other security measures. 

Challenges with OTPs in VR Training:

OTP security is crucial, but for VR training, balancing security with user experience and practicality is key. Exploring authentication methods tailored to VR can enhance training effectiveness and security while accommodating the unique needs of VR learning programs. 

Shared Devices

In many organizations, VR devices are shared among multiple users, creating unique security challenges compared to devices dedicated to a single user. While shared VR devices optimize resources and reduce costs, they introduce complexities in ensuring data security and user privacy. Unlike personal devices, where security settings and user data are tied to one individual, shared VR devices must accommodate a variety of users, each with different access privileges, workflows, and data needs as the training program grows.

One of the primary security concerns with shared devices is the potential for cross-user data exposure. Without proper session management, sensitive information from one user’s session—such as training data or personal authentication tokens—could be inadvertently accessed by another. This risk is particularly concerning in industries with strict compliance regulations, such as energy, healthcare or finance, where protecting personal or confidential information is paramount.

Another challenge is managing user authentication on shared devices. Personal devices often rely on multi-factor authentication (MFA) and biometric systems to ensure secure, individualized access. However, with shared VR devices, implementing similar authentication methods can be cumbersome, as users may not always have access to personal devices like phones or laptops to receive one-time passwords (OTPs) or other verification tokens. Striking a balance between security and a seamless user experience is crucial, especially in training environments where rapid user turnover is common.

These challenges are further complicated by the risk of device integrity and configuration consistency. Frequent switching between users can lead to configuration drift or unintentional modifications of critical settings, such as OS security features or network configurations. This could introduce vulnerabilities, such as when a user disables security measures like USB debugging or installs unauthorized apps that could compromise the system.

To mitigate these risks, organizations can implement several strategies:

An important consideration in many organizations is that shared VR devices are often used in controlled environments where a training manager supervises the sessions. This adds a valuable layer of security, as the manager ensures that the devices are only used during scheduled training sessions and can enforce proper security measures in real-time. While this oversight mitigates some risks, it’s not a complete solution to the challenges of shared device security. The organization still needs to implement authentication, session management, and physical security protocols to protect against breaches and ensure consistent device performance.

Ultimately, while shared VR devices offer flexibility and cost savings, they require heightened security management to prevent data breaches, ensure proper authentication, and maintain configuration consistency. Organizations must adapt their security strategies to these unique challenges, ensuring that user privacy and data integrity remain intact across every session, with or without the training manager present.