SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Downloaden Sie, um offline zu lesen
Initiative 6


Mobile Device Management:
     Key Components, V1.0
                   September 2012




                            Document
                             Sponsor
CLOUD SECURITY ALLIANCE Mobile Device Management: Key Components, V1.0, September 2012




© 2012 Cloud Security Alliance

All rights reserved. You may download, store, display on your computer, view, print, and link to the Cloud
Security Alliance Security as a Service Implementation Guidance at http://www.cloudsecurityalliance.org,
subject to the following: (a) the Guidance may be used solely for your personal, informational, non-commercial
use; (b) the Guidance may not be modified or altered in any way; (c) the Guidance may not be redistributed; and
(d) the trademark, copyright or other notices may not be removed. You may quote portions of the Guidance as
permitted by the Fair Use provisions of the United States Copyright Act, provided that you attribute the portions
to the Cloud Security Alliance Security as a Service Implementation Guidance Version 1.0 (2012).


© Copyright 2012, Cloud Security Alliance. All rights reserved.                                                 1
CLOUD SECURITY ALLIANCE Mobile Device Management: Key Components, V1.0, September 2012




Contents
Acknowledgments ......................................................................................................................................................3
SECTION 1: Introduction and Context ........................................................................................................................4
SECTION 2: MDM Key Components to Consider in Both Scenarios – BYOD or Company-Owned Devices ...............5
   2.1 Policy         ............................................................................................................................................................5
   2.2 Risk Management                  .........................................................................................................................................5
   2.3 Device Diversity / Degree of Freedom                             .........................................................................................................6
   2.4 Configuration Management                         .........................................................................................................................6
   2.5 Software Distribution                  ...................................................................................................................................6
   2.6 Enterprise AppStore                  .....................................................................................................................................7
   2.7 Content Library              .............................................................................................................................................7
   2.8 Procurement              .................................................................................................................................................7
   2.9 Provisioning            ..................................................................................................................................................7
   2.10 Device Policy Compliance & Enforcement                                  .................................................................................................7
   2.11 Enterprise Activation / Deactivation                           ..........................................................................................................8
   2.12 Enterprise Asset Disposition                      .......................................................................................................................8
   2.13 Process Automation                    ...................................................................................................................................8
   2.14 User Activity Logging / Workplace Monitoring                                   ..........................................................................................9
   2.15 Security Settings               .........................................................................................................................................9
   2.16 Selective Wipe / Remote Wipe / Lock                              ........................................................................................................9
   2.17 Identity Management / Authentication / Encryption                                        ................................................................................9
SECTION 3: CONCLUSION ........................................................................................................................................ 11




© Copyright 2012, Cloud Security Alliance. All rights reserved.                                                                                                                  2
CLOUD SECURITY ALLIANCE Mobile Device Management: Key Components, V1.0, September 2012




Acknowledgments
CSA Mobile Working Group Co-Chairs

David Lingenfelter, Fiberlink
Freddy Kasprzykowski, Microsoft
Cesare Garlati, Trend Micro



Initiative Lead

Guido Sanchidrian, Symantec



Contributors

Jane Cosnowsky, Dell
Sam Wilke
Allen Lum, Control Solutions
Jay Musterman, Cox Communications
Somanath NG, Infosys
Eiji Sasahara, IDC
Alice Decker, Trend Micro
Pamela Fusco, Virtuosi Group
Nader Henein, Research In Motion
Paul Madsen, Ping Identity
Tyler Shields, Veracode
Subbu Iyer, Zscaler




© Copyright 2012, Cloud Security Alliance. All rights reserved.                                                 3
CLOUD SECURITY ALLIANCE Mobile Device Management: Key Components, V1.0, September 2012




SECTION 1: Introduction and Context
With the growth in the number of applications, content, and data being accessed through a variety of devices,
Mobile Device Management (MDM) is vital to managing the mobile enterprise. MDM is about much more than
device management alone—it includes system-centric functionality to secure and manage data and applications,
as well as information-centric functionality such as the delivery of the enterprise application store or content
library.




                                                           Planning




                                Retirement /
                                                                           Acquisition
                                Replacement              Hardware
                                                         Software
                                                           Service


                                         Management                   Deployment




MDM is a critical component of the device lifecycle, covering the device hardware, software, and attached
services.

Full lifecycle management is required, and IT is fully responsible for the company-owned devices, including
setting hardware/OS standards, application support and enterprise liability. However, organizations might
choose a “degree of freedom” for their users, such as increased hardware and OS choices by Bring-Your-Own-
Device (BYOD) support, or might provide limited capabilities such as corporate email or web services only. Both
will create shared responsibilities and a mix of enterprise and user liabilities that should be properly defined,
communicated, and managed.




© Copyright 2012, Cloud Security Alliance. All rights reserved.                                                 4
CLOUD SECURITY ALLIANCE Mobile Device Management: Key Components, V1.0, September 2012




SECTION 2: MDM Key Components to Consider in
Both Scenarios – BYOD or Company-Owned
Devices

            Software and
                                                          Inventory                                 Security
             Hardware
         •Device Diversity / Degree               •Procurement                              •Security Settings
          of Freedom                              •Provisioning                             •Selectivve Wipe / Remote
         •Configuration                           •Device Policy Compliance                  Wipe / Lock
          Management                               & Enforcement                            •Identity Management /
         •Software Distribution                   •Enterprise Activation /                   Authentication /
          • Backup / Restore                       Deactivation                              Encryption
          • Patches / Fixes                       •Enterprise Assest
          • Updates                                Disposition
          • Synchronization                       •Process Automation
         •Enterprise AppStore                     •User Activity Logging /
         •Content Library                          Workplace Monitoring


                                           Policy / Risk Management



2.1 Policy                                                                                            Rating1: Must Have
The definition and distribution of a policy is a critical prerequisite of mobile computing strategies. Organizations
should assess the needs of the workforce and build or revise the mobile policy accordingly. Risk assessment and
management should be performed to recognize the significance of IT and information risk, which both defines a
basis for developing awareness and enables analysis of the business risk impact. A well-defined policy provides
management direction and support for IT and information security and is the foundation for a solid MDM
framework implementation.

2.2 Risk Management                                                                                    Rating: Must Have


1
 The initial rating is based on common importance and risk level of each component. Depending on organizations individual risk
assessment results, the rating might change dynamically case-by-case.



© Copyright 2012, Cloud Security Alliance. All rights reserved.                                                                  5
CLOUD SECURITY ALLIANCE Mobile Device Management: Key Components, V1.0, September 2012




Risk management means the entire process of analysis, planning, implementation, control, and monitoring of
defined measurements and the enforced policy. Organizations should consider the impact of the introduction of
mobile devices as end-point devices within their corporate network. If risks are identified, the appropriate
mobile device policies can be applied. In an extreme case, if the risk is deemed too high, additional controls
should be implemented to bring the risk to an acceptable level, allowing seamless access to IT resources from
mobile devices. On the other hand, if the risk is low or non-existent, the organization can require minimal
controls for the mobile devices, thereby reducing overall costs.

As part of risk management, organizations should perform risk assessment periodically (i.e. once a year) or on-
demand (i.e. introducing new devices, services, or significant infrastructure changes) to provide a temporary
view of assessed risks and to review the risk management process, either in parts or entirely, and make
necessary changes accordingly.2

2.3 Device Diversity / Degree of Freedom                                                                Rating: Optional
Both scenarios—BYOD and company-owned devices—require segmentation and acceptable usage planning built
on a multi-dimensional matrix, which includes the user’s role, responsibility (including ownership and support),
data, networks and applications, and which states the user’s degree of freedom for each area. This planning
also defines the capabilities provided, such as corporate email, web services, support, multimedia, specialized
applications and services, corporate databases such as CRM, and analytics.

2.4 Configuration Management                                                                         Rating: Must Have
Configuration management involves automated configuration of device settings, such as password strength and
policy, email, VPN and Wi-Fi. Configuration management aids in the elimination of user errors and minimizes
vulnerabilities caused by misconfiguration, including configuration lockdown according to a degree-of-freedom
definition, as well as hardware lockdown such as camera, Bluetooth, and Wi-Fi. Configuration management is
also used in an effort to enforce corporate IT mobility policies.

2.5 Software Distribution                                                                            Rating: Must Have
Software distribution includes applications and software accessed over-the-air or by PC synchronization. It
includes updates for applications or OSs, patches, fixes, backup and restore functionality, background
synchronization, and basic file distribution capabilities. Backup and restore functionality accessed over-the-air or
via PC-sync in particular becomes important in situations of device crash and replacements, intentional wipeout
(i.e. in case of lost or stolen device) or unintentional wipeout (i.e. kids play with device and try password too
often), so the device can be recovered quickly without significant productivity loss. Aligned to the corporate
mobile policies it ensures the distribution of only security assessed mobile applications to the device. Along with
Configuration Management, software distribution helps to enforce the corporate approach of black-listing
and/or white-listing applications and other software on the device. Mobile Device Management systems


2
  Visit European Network and Security Agency (ENISA) website at http://www.enisa.europa.eu/activities/risk-management/current-
risk/risk-management-inventory/rm-isms for an introduction on Risk Management and Risk Assessment.



© Copyright 2012, Cloud Security Alliance. All rights reserved.                                                                  6
CLOUD SECURITY ALLIANCE Mobile Device Management: Key Components, V1.0, September 2012




generally do not have a capability to analyze mobile applications for security risk. The analysis of these
applications should be conducted separately in order to populate the white-list and black-list approaches with
actionable application security assessments.

2.6 Enterprise AppStore                                                                    Rating: Optional
An Enterprise AppStore ensures that only secure and trusted applications along with associated content will be
deployed on mobile devices while providing several paths of accessibility: through deployment of mobile
applications over-the-air, recommended apps from the public AppStore, or via a company-specific app
repository. AppStores include appropriate code-signing of specialized or in-house applications to ensure the
integrity of the application. Enterprise AppStores provide an excellent environment in the corporate mobile
ecosystem to implement security testing and application whitelisting.

2.7 Content Library                                                                        Rating: Optional
A content library distributes corporate content, such as documents and multi-media videos, to provide a secure
enterprise container with near-real-time updates and specific views. The library may include the secure usage of
Cloud storage providers, or sandbox/virtualized environments to separate corporate content from private
content. In the case of different containers it may be necessary to control applications and information
differently with different policies depending on whether they or corporate or personal apps and information.

2.8 Procurement                                                                         Rating: Must Have
With devices evolving into application development and integration platforms, IT is likely taking ownership of
the end-to-end solution by contracting wireless carriers and programs and managing service usage. However,
the finance department maintains responsibility for monitoring and controlling mobility costs, such as contract
and expense management. It is important to collaborate and align with Legal and HR departments to define
certain terms and conditions in the policy and employee agreements. In particular, BYOD creates a mix of
corporate and personal liability and responsibility. Liability for all parties should be clearly defined in these
agreements and should include subjects such as private usage of corporate services, expense compensations,
employee privacy policy, shared responsibilities for device and content security, misuse, secure wipe of the
device including personal data in the event the device is lost or stolen, or the rights to control the device
through a device management client.

2.9 Provisioning                                                                           Rating: Optional
Provisioning devices with a three year refresh is acceptable for company-owned devices, but IT cannot possibly
manage employee-liable devices that are refreshed annually (or in even shorter cycles for smartphones and
tablets). Expectations about end-user support should be clear and frequently refreshed, as self-help is often not
accepted by some users, in particular those with brand new devices.

2.10 Device Policy Compliance & Enforcement                                             Rating: Must Have



© Copyright 2012, Cloud Security Alliance. All rights reserved.                                                     7
CLOUD SECURITY ALLIANCE Mobile Device Management: Key Components, V1.0, September 2012




Device policy compliance and enforcement is involved in device supply, control, and tracking. Asset inventory
assessments are critical prerequisites for policy enforcement to comply with corporate and regulatory
requirements around policies, encryption, jail-broken or rooted-device detection, and privacy-related separation
of personal content vs. corporate content. Compliance and enforcement also includes approval and review
processes of apps in the organization’s AppStore, as well as approval of mobile configurations to ensure that
they meet the organization’s security policies before roll out. The organization will allow or deny access to
devices based on their approval status. This is an ongoing monitoring and enforcement process, often described
as Plan-Do-Check-Act approach of policies in various Information Security Management System standards and
frameworks such as ISO 27001 or COBIT. It also requires alerts and notifications capabilities to provide asset
reporting about devices, users, and apps. As part of the organizational infrastructure change control or similar
processes, it is highly recommended to document that the policy and standard has been applied to the device
and has been acknowledged by the user before the device is distributed.

2.11 Enterprise Activation / Deactivation                                                 Rating: Must Have
Enterprise activation or deactivation is usually a self-service functionality that activates or connects mobile
devices to the enterprise network, or that allows or denies access to users based on directory groups. A proper
implementation of it (in particular an implementation as a self-service) will reduce the administrative burden of
provisioning and re-provisioning at the IT department. User acceptance is an important factor of it and should
be clarified and well communicated in the beginning. In particular in environments where users bring in their
own devices, choosing enterprise activation will likely share certain details like operating system, device
identifier, IMEI number, etc. as part of the provision process. The process can be either automated through a
provisioning portal to enter the required details and follow the workflow to activate the device, or it can be a
manual process where the administrator will do the complete activation by taking the required details from the
user. In addition, after enterprise activation some characteristics of the device may be changed like enabled
encryption, changed password settings, certain application restrictions, etc.

2.12 Enterprise Asset Disposition                                                         Rating: Must Have
Enterprise asset disposition involves removal of physical devices by decommission or by releasing the device to
the BYOD owner in case of device exchange, upgrade, or permanent decommissioning. Appropriate technical
and procedural controls should be in place on inventory management, user receipts or acknowledgements, and
related physical actions required for proper handling during decommissioning. It is important to securely wipe
the corporate data from a personal device before it is decommissioned. If the device itself is not owned by
enterprise, it should be handed over to the device owner ideally without touching the personal data, music, and
apps.

2.13 Process Automation                                                                      Rating: Optional
Process automation creates and implements automated processes that link together people, processes, and
technology. It automates regular tasks like device registration and lost devices (i.e. if a device is lost or stolen,
an automated workflow should be initiated that remotely wipes the device and revokes particular access rights.
Then, a new device should be provisioned, with appropriate pre-load and configuration prior delivery to the


© Copyright 2012, Cloud Security Alliance. All rights reserved.                                                         8
CLOUD SECURITY ALLIANCE Mobile Device Management: Key Components, V1.0, September 2012




user). Process automation also includes technical tasks such as backup restore, as well as procedural tasks
where human attestation is required (i.e. management sign-off for the order).

2.14 User Activity Logging / Workplace Monitoring                                                      Rating: Must Have
More and more organizations are turning to workplace monitoring3 and data loss prevention (DLP) technology.
Workplace monitoring is usually governed by a variety of privacy laws, rules, and regulations. In some countries,
the laws on telecommunications regulate the monitoring of email and other electronic communications. In
other countries, an employer’s rights to monitor employee communications may be governed by collective
bargaining agreements, employment contracts, or general privacy and data protection legislation. It is
important to understand that privacy is treated as a fundamental human right and, as such, cannot be bargained
away. This becomes more complex with environments with both corporate supplied and BYOD devices where
laws and regulations are significantly different. Organizations are highly recommended to seek legal counsel to
understand the privacy and data protection laws of the individual countries in which they operate.

2.15 Security Settings                                                                                 Rating: Must Have
According to company policy, security settings provide advanced security on devices irrespective of ownership.
They set, deploy, and update settings like passwords, wipe, and application/resource restrictions, usually
without any user intervention. Security can be broken into two basic components; user security and data
security. While user and data security are tightly coupled there are some distinct differences which must be
accounted for and sometimes handled quite differently. In both cases companies must take steps to protect
the user and the data from potential threats.

2.16 Selective Wipe / Remote Wipe / Lock                                                               Rating: Must Have
Selective wipe securely wipes the corporate data from a personal device, without touching the personal data,
music, and apps. It will also delete documents from the user’s Content Library. If a device is lost or stolen, a
remote wipe must be performed by either the administrator or the end user. The remote wipe will, in effect,
wipe all information from the device returning it to factory default configuration. Similarly a Lock can be
performed on a device by the administrator or end user to ensure that protection is in place should the device
become temporarily misplaced. If the wrong password is entered multiple times, an automatic wipe will be
triggered.

2.17 Identity Management / Authentication / Encryption                                                 Rating: Must Have
Identity management, authentication, and encryption involved management of strong encryption of local data
(device memory, external memory cards) and data in motion (such as email S/MIME encryption and
authentication). It requires certificate distribution capabilities and certificate-based authentication (including
device ID, OS version, phone number) to identify the device and user properly. Strong certificate-based

3
 The term “monitoring” is used broadly to refer to any reading, collection, or storage of electronic communications. Monitoring is,
therefore, more than the interception of communications in transit. Copying of employee emails for backups or scanning messages to
detect viruses are both considered to be monitoring.



© Copyright 2012, Cloud Security Alliance. All rights reserved.                                                                       9
CLOUD SECURITY ALLIANCE Mobile Device Management: Key Components, V1.0, September 2012




authentication enables secure access to corporate email, web-based applications, VPN and Wi-Fi. It comes
along with overlaying identity management processes and mechanisms by which enterprise employees are
issued accounts and credentials required to provide access to the device, the business applications and services
based on a context-aware policy that includes who they are, their role, their device, their network and their
information and application. It could also enables employees access to cloud applications and services on
mobile devices via single sign-on credentials and identity brokering to authenticate to third-party SaaS.




© Copyright 2012, Cloud Security Alliance. All rights reserved.                                                10
CLOUD SECURITY ALLIANCE Mobile Device Management: Key Components, V1.0, September 2012




SECTION 3: CONCLUSION



                                                  Technology




                                     Process                       People



Mobile devices have quickly become a mainstay in enterprise environments, and while mobile devices continue
to be consumer driven in both form and function they have found their way into our day-to-day business
lives. Mobile device management, like management of any technology or resource in the corporate space, has
to start with the basic understanding of the key components of that eternal "people, process, technology"
triangle. While most companies already have security policies in place, those policies need to be reviewed and
possibly updated to account for the many components of mobile technology that have been spelled out in this
document. Every company will have a different tolerance for risk and will adopt mobile technology in different
ways, but there are still several fundamental components of mobile device management that have to be
considered and incorporated into policy and practice to ensure that introducing this technology will not
compromise security.

As the mobile technology continues to advance, and new uses for it are discovered some of these key
components outlined in this document may become more critical to a successful security strategy than
others. There may also be new components to mobile device management that come into play as the
technology continues to advance. Mobile devices are a great personal enabler and the consistent availability of
mobile devices makes the integration of personal and business objectives almost inevitable. As such the Cloud
Security Alliance Mobile Working group will continue to work on educating and developing guidance’s around
mobile devices and how best to manage and integrate them into our work environments.




© Copyright 2012, Cloud Security Alliance. All rights reserved.                                                11

Weitere ähnliche Inhalte

Was ist angesagt?

Pros and Cons of Mobile Device Management
Pros and Cons of Mobile Device ManagementPros and Cons of Mobile Device Management
Pros and Cons of Mobile Device ManagementXperteks
 
Enterprise Mobile Device Management (MDM)
Enterprise Mobile Device Management (MDM)Enterprise Mobile Device Management (MDM)
Enterprise Mobile Device Management (MDM)SPEC INDIA
 
Mobile Device Management: Securing your Mobile Environment.
Mobile Device Management: Securing your Mobile Environment.Mobile Device Management: Securing your Mobile Environment.
Mobile Device Management: Securing your Mobile Environment.[x]cube LABS
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DeviceWaterstons Ltd
 
Mobile device management and byod – major players
Mobile device management and byod – major playersMobile device management and byod – major players
Mobile device management and byod – major playersWaterstons Ltd
 
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanMobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanDavid J Rosenthal
 
Mobile device management-Desktop Central
Mobile device management-Desktop CentralMobile device management-Desktop Central
Mobile device management-Desktop CentralManageEngine
 
Mobile Device Management for Dummies
Mobile Device Management for DummiesMobile Device Management for Dummies
Mobile Device Management for DummiesSybase Türkiye
 
AirWatch Solution Overview
AirWatch Solution OverviewAirWatch Solution Overview
AirWatch Solution OverviewProyet Kft
 
Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Chris Pepin
 
Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM] Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM] Leena N
 
[Brochure ] mobi manager mdm_software
[Brochure ] mobi manager mdm_software[Brochure ] mobi manager mdm_software
[Brochure ] mobi manager mdm_softwareSyeful Islam
 
Enterprise Mobility Suite- Introduction
Enterprise Mobility Suite- IntroductionEnterprise Mobility Suite- Introduction
Enterprise Mobility Suite- IntroductionLai Yoong Seng
 
Syncshield 1.8.1 Cross Platform MDM Solution
Syncshield 1.8.1 Cross Platform MDM SolutionSyncshield 1.8.1 Cross Platform MDM Solution
Syncshield 1.8.1 Cross Platform MDM SolutionSteven Cull
 
Mobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsMobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsWaterstons Ltd
 
Mobile Device Managment
Mobile Device Managment Mobile Device Managment
Mobile Device Managment InnoTech
 

Was ist angesagt? (20)

Pros and Cons of Mobile Device Management
Pros and Cons of Mobile Device ManagementPros and Cons of Mobile Device Management
Pros and Cons of Mobile Device Management
 
Mobile Device Management (MDM)
Mobile Device Management (MDM)Mobile Device Management (MDM)
Mobile Device Management (MDM)
 
Enterprise Mobile Device Management (MDM)
Enterprise Mobile Device Management (MDM)Enterprise Mobile Device Management (MDM)
Enterprise Mobile Device Management (MDM)
 
Mobile Device Management: Securing your Mobile Environment.
Mobile Device Management: Securing your Mobile Environment.Mobile Device Management: Securing your Mobile Environment.
Mobile Device Management: Securing your Mobile Environment.
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own Device
 
Airwatch od VMware
Airwatch od VMwareAirwatch od VMware
Airwatch od VMware
 
Mobile device management and byod – major players
Mobile device management and byod – major playersMobile device management and byod – major players
Mobile device management and byod – major players
 
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanMobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
 
Mobile device management-Desktop Central
Mobile device management-Desktop CentralMobile device management-Desktop Central
Mobile device management-Desktop Central
 
Mobile Device Management for Dummies
Mobile Device Management for DummiesMobile Device Management for Dummies
Mobile Device Management for Dummies
 
MDM - airwatch
MDM - airwatchMDM - airwatch
MDM - airwatch
 
AirWatch Solution Overview
AirWatch Solution OverviewAirWatch Solution Overview
AirWatch Solution Overview
 
Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013Best practices of mobile technology leaders: Airwatch Connect 2013
Best practices of mobile technology leaders: Airwatch Connect 2013
 
Windows intune
Windows intuneWindows intune
Windows intune
 
Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM] Learnings while building Mobile Device Management [MDM]
Learnings while building Mobile Device Management [MDM]
 
[Brochure ] mobi manager mdm_software
[Brochure ] mobi manager mdm_software[Brochure ] mobi manager mdm_software
[Brochure ] mobi manager mdm_software
 
Enterprise Mobility Suite- Introduction
Enterprise Mobility Suite- IntroductionEnterprise Mobility Suite- Introduction
Enterprise Mobility Suite- Introduction
 
Syncshield 1.8.1 Cross Platform MDM Solution
Syncshield 1.8.1 Cross Platform MDM SolutionSyncshield 1.8.1 Cross Platform MDM Solution
Syncshield 1.8.1 Cross Platform MDM Solution
 
Mobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsMobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefits
 
Mobile Device Managment
Mobile Device Managment Mobile Device Managment
Mobile Device Managment
 

Andere mochten auch

Temia Mobile Device Management Webinar 03 21-12
Temia Mobile Device Management Webinar 03 21-12Temia Mobile Device Management Webinar 03 21-12
Temia Mobile Device Management Webinar 03 21-12Wireless_Analytics
 
Presentation on mobile phones
Presentation on mobile phonesPresentation on mobile phones
Presentation on mobile phonessirtwinkles
 
The evolution of mobile phones
The evolution of mobile phonesThe evolution of mobile phones
The evolution of mobile phonesOlivia2590
 
The Bizarre History of Mobile Technology
The Bizarre History of Mobile TechnologyThe Bizarre History of Mobile Technology
The Bizarre History of Mobile TechnologyRenee Floyd
 
The emerging mobile ecosystem
The emerging mobile ecosystemThe emerging mobile ecosystem
The emerging mobile ecosystemRohit Kumar
 
Mobile Ecosystem Dynamics (CTO Briefing)
Mobile Ecosystem Dynamics (CTO Briefing)Mobile Ecosystem Dynamics (CTO Briefing)
Mobile Ecosystem Dynamics (CTO Briefing)Paul Golding
 
A brief history of mobile technology
A brief history of mobile technologyA brief history of mobile technology
A brief history of mobile technologyDaniele Dalledonne
 
VMworld Europe 2014: Preview the Latest Release from AirWatch
VMworld Europe 2014: Preview the Latest Release from AirWatchVMworld Europe 2014: Preview the Latest Release from AirWatch
VMworld Europe 2014: Preview the Latest Release from AirWatchVMworld
 
Ds Mobile Ecosystem 081408
Ds Mobile Ecosystem 081408Ds Mobile Ecosystem 081408
Ds Mobile Ecosystem 081408space150
 
Modulo Mobile Marketing por Ana Lopez (Universidad del Norte, julio 3 y 4 de ...
Modulo Mobile Marketing por Ana Lopez (Universidad del Norte, julio 3 y 4 de ...Modulo Mobile Marketing por Ana Lopez (Universidad del Norte, julio 3 y 4 de ...
Modulo Mobile Marketing por Ana Lopez (Universidad del Norte, julio 3 y 4 de ...Ana Lopez
 
Google Mobile OS Competitive Strategy - May 2010
Google Mobile OS Competitive Strategy - May 2010Google Mobile OS Competitive Strategy - May 2010
Google Mobile OS Competitive Strategy - May 2010rkalavar
 
The mobile ecosystem and development strategies
The mobile ecosystem and development strategiesThe mobile ecosystem and development strategies
The mobile ecosystem and development strategiesIvano Malavolta
 
Mobile VAS and Multimedia Ecosystem and Value‐Chain over 4G and 4.5G Network ...
Mobile VAS and Multimedia Ecosystem and Value‐Chain over 4G and 4.5G Network ...Mobile VAS and Multimedia Ecosystem and Value‐Chain over 4G and 4.5G Network ...
Mobile VAS and Multimedia Ecosystem and Value‐Chain over 4G and 4.5G Network ...Ali Saghaeian
 
Brief history about mobile marketing
Brief history about mobile marketingBrief history about mobile marketing
Brief history about mobile marketingKamil Mehmet Özkan
 
Choosing AirWatch by VMware as a BYOD solution - A Blue Hill Research Case Study
Choosing AirWatch by VMware as a BYOD solution - A Blue Hill Research Case StudyChoosing AirWatch by VMware as a BYOD solution - A Blue Hill Research Case Study
Choosing AirWatch by VMware as a BYOD solution - A Blue Hill Research Case Study3Sixty Insights
 
Cadena De Valor Telefonía Móvil
Cadena De Valor Telefonía MóvilCadena De Valor Telefonía Móvil
Cadena De Valor Telefonía MóvilJuan Alvarez
 
Mock User Acquisition Marketing Plan
Mock User Acquisition Marketing PlanMock User Acquisition Marketing Plan
Mock User Acquisition Marketing PlanVincent Barr
 
Five forces model cellphone industry
Five forces model   cellphone industryFive forces model   cellphone industry
Five forces model cellphone industryUmer Saeed
 
Porter's 5 forces analysis - Nokia
Porter's 5 forces analysis - NokiaPorter's 5 forces analysis - Nokia
Porter's 5 forces analysis - NokiaPankaj Saharan
 

Andere mochten auch (20)

Temia Mobile Device Management Webinar 03 21-12
Temia Mobile Device Management Webinar 03 21-12Temia Mobile Device Management Webinar 03 21-12
Temia Mobile Device Management Webinar 03 21-12
 
Presentation on mobile phones
Presentation on mobile phonesPresentation on mobile phones
Presentation on mobile phones
 
The evolution of mobile phones
The evolution of mobile phonesThe evolution of mobile phones
The evolution of mobile phones
 
The Bizarre History of Mobile Technology
The Bizarre History of Mobile TechnologyThe Bizarre History of Mobile Technology
The Bizarre History of Mobile Technology
 
The emerging mobile ecosystem
The emerging mobile ecosystemThe emerging mobile ecosystem
The emerging mobile ecosystem
 
Mobile Ecosystem Dynamics (CTO Briefing)
Mobile Ecosystem Dynamics (CTO Briefing)Mobile Ecosystem Dynamics (CTO Briefing)
Mobile Ecosystem Dynamics (CTO Briefing)
 
A brief history of mobile technology
A brief history of mobile technologyA brief history of mobile technology
A brief history of mobile technology
 
VMworld Europe 2014: Preview the Latest Release from AirWatch
VMworld Europe 2014: Preview the Latest Release from AirWatchVMworld Europe 2014: Preview the Latest Release from AirWatch
VMworld Europe 2014: Preview the Latest Release from AirWatch
 
Ds Mobile Ecosystem 081408
Ds Mobile Ecosystem 081408Ds Mobile Ecosystem 081408
Ds Mobile Ecosystem 081408
 
Modulo Mobile Marketing por Ana Lopez (Universidad del Norte, julio 3 y 4 de ...
Modulo Mobile Marketing por Ana Lopez (Universidad del Norte, julio 3 y 4 de ...Modulo Mobile Marketing por Ana Lopez (Universidad del Norte, julio 3 y 4 de ...
Modulo Mobile Marketing por Ana Lopez (Universidad del Norte, julio 3 y 4 de ...
 
Google Mobile OS Competitive Strategy - May 2010
Google Mobile OS Competitive Strategy - May 2010Google Mobile OS Competitive Strategy - May 2010
Google Mobile OS Competitive Strategy - May 2010
 
The mobile ecosystem and development strategies
The mobile ecosystem and development strategiesThe mobile ecosystem and development strategies
The mobile ecosystem and development strategies
 
Mobile VAS and Multimedia Ecosystem and Value‐Chain over 4G and 4.5G Network ...
Mobile VAS and Multimedia Ecosystem and Value‐Chain over 4G and 4.5G Network ...Mobile VAS and Multimedia Ecosystem and Value‐Chain over 4G and 4.5G Network ...
Mobile VAS and Multimedia Ecosystem and Value‐Chain over 4G and 4.5G Network ...
 
Brief history about mobile marketing
Brief history about mobile marketingBrief history about mobile marketing
Brief history about mobile marketing
 
Choosing AirWatch by VMware as a BYOD solution - A Blue Hill Research Case Study
Choosing AirWatch by VMware as a BYOD solution - A Blue Hill Research Case StudyChoosing AirWatch by VMware as a BYOD solution - A Blue Hill Research Case Study
Choosing AirWatch by VMware as a BYOD solution - A Blue Hill Research Case Study
 
Cadena De Valor Telefonía Móvil
Cadena De Valor Telefonía MóvilCadena De Valor Telefonía Móvil
Cadena De Valor Telefonía Móvil
 
Mock User Acquisition Marketing Plan
Mock User Acquisition Marketing PlanMock User Acquisition Marketing Plan
Mock User Acquisition Marketing Plan
 
Five forces model cellphone industry
Five forces model   cellphone industryFive forces model   cellphone industry
Five forces model cellphone industry
 
Caso de Estudio Apple Harvard
Caso de Estudio Apple HarvardCaso de Estudio Apple Harvard
Caso de Estudio Apple Harvard
 
Porter's 5 forces analysis - Nokia
Porter's 5 forces analysis - NokiaPorter's 5 forces analysis - Nokia
Porter's 5 forces analysis - Nokia
 

Ähnlich wie MDM Key Components for BYOD and Company Devices

Mobile Device Management - Product Study
Mobile Device Management - Product StudyMobile Device Management - Product Study
Mobile Device Management - Product StudySrinivasan M.S
 
A MOBILITY SOLUTION FOR AN ENTERPRISE CUSTOMER.compressed
A MOBILITY SOLUTION FOR AN ENTERPRISE CUSTOMER.compressedA MOBILITY SOLUTION FOR AN ENTERPRISE CUSTOMER.compressed
A MOBILITY SOLUTION FOR AN ENTERPRISE CUSTOMER.compressedMotasem Al Amour
 
The VMware Mobile Secure Workplace
The VMware Mobile Secure WorkplaceThe VMware Mobile Secure Workplace
The VMware Mobile Secure WorkplaceVMware
 
Advocate Consulting Mobile Device Management Brochure
Advocate Consulting Mobile Device Management BrochureAdvocate Consulting Mobile Device Management Brochure
Advocate Consulting Mobile Device Management BrochureJon Prete
 
Advocate Consulting - Mobile Device Management
Advocate Consulting - Mobile Device ManagementAdvocate Consulting - Mobile Device Management
Advocate Consulting - Mobile Device ManagementAdvocate Consulting
 
Trends in Cloud Computing
Trends in Cloud ComputingTrends in Cloud Computing
Trends in Cloud Computingawais mushtaq
 
Securing Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsSecuring Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsHerve Danzelaud
 
Trusted Cloud Initiative: Identity Management Research
Trusted Cloud Initiative: Identity Management ResearchTrusted Cloud Initiative: Identity Management Research
Trusted Cloud Initiative: Identity Management Researchguestba832ad
 
CA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise MobilityCA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise MobilityCA Technologies
 
R ramya devi cloud computing
R ramya devi cloud computingR ramya devi cloud computing
R ramya devi cloud computingPriyadharshiniVS
 
Enabling People Centric Processes - a Microsoft IT Preview Guide
Enabling People Centric Processes  - a Microsoft IT Preview GuideEnabling People Centric Processes  - a Microsoft IT Preview Guide
Enabling People Centric Processes - a Microsoft IT Preview GuideDavid J Rosenthal
 
10-TOP-IT-INITIATIVES_6-6-16
10-TOP-IT-INITIATIVES_6-6-1610-TOP-IT-INITIATIVES_6-6-16
10-TOP-IT-INITIATIVES_6-6-16Peak 10
 
Building Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT PracticesBuilding Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT PracticesMighty Guides, Inc.
 
Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec
 
Securing todays mobile_workforce-white_paper
Securing todays mobile_workforce-white_paperSecuring todays mobile_workforce-white_paper
Securing todays mobile_workforce-white_paperCatherine Pham
 
IBM Point of view -- Security and Cloud Computing (Tivoli)
IBM Point of view -- Security and Cloud Computing (Tivoli)IBM Point of view -- Security and Cloud Computing (Tivoli)
IBM Point of view -- Security and Cloud Computing (Tivoli)IBM India Smarter Computing
 
u10a1 Security Plan-Beji Jacob
u10a1 Security Plan-Beji Jacobu10a1 Security Plan-Beji Jacob
u10a1 Security Plan-Beji JacobBeji Jacob
 

Ähnlich wie MDM Key Components for BYOD and Company Devices (20)

Mobile Device Management - Product Study
Mobile Device Management - Product StudyMobile Device Management - Product Study
Mobile Device Management - Product Study
 
Advaiya enterprise mobility whitepaper
Advaiya enterprise mobility whitepaperAdvaiya enterprise mobility whitepaper
Advaiya enterprise mobility whitepaper
 
A MOBILITY SOLUTION FOR AN ENTERPRISE CUSTOMER.compressed
A MOBILITY SOLUTION FOR AN ENTERPRISE CUSTOMER.compressedA MOBILITY SOLUTION FOR AN ENTERPRISE CUSTOMER.compressed
A MOBILITY SOLUTION FOR AN ENTERPRISE CUSTOMER.compressed
 
The VMware Mobile Secure Workplace
The VMware Mobile Secure WorkplaceThe VMware Mobile Secure Workplace
The VMware Mobile Secure Workplace
 
Advocate Consulting Mobile Device Management Brochure
Advocate Consulting Mobile Device Management BrochureAdvocate Consulting Mobile Device Management Brochure
Advocate Consulting Mobile Device Management Brochure
 
Advocate Consulting - Mobile Device Management
Advocate Consulting - Mobile Device ManagementAdvocate Consulting - Mobile Device Management
Advocate Consulting - Mobile Device Management
 
Trends in Cloud Computing
Trends in Cloud ComputingTrends in Cloud Computing
Trends in Cloud Computing
 
Securing Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsSecuring Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good Dynamics
 
Trusted Cloud Initiative: Identity Management Research
Trusted Cloud Initiative: Identity Management ResearchTrusted Cloud Initiative: Identity Management Research
Trusted Cloud Initiative: Identity Management Research
 
CA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise MobilityCA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise Mobility
 
R ramya devi cloud computing
R ramya devi cloud computingR ramya devi cloud computing
R ramya devi cloud computing
 
Enabling People Centric Processes - a Microsoft IT Preview Guide
Enabling People Centric Processes  - a Microsoft IT Preview GuideEnabling People Centric Processes  - a Microsoft IT Preview Guide
Enabling People Centric Processes - a Microsoft IT Preview Guide
 
Handheld Applications guidebook
Handheld Applications guidebookHandheld Applications guidebook
Handheld Applications guidebook
 
10-TOP-IT-INITIATIVES_6-6-16
10-TOP-IT-INITIATIVES_6-6-1610-TOP-IT-INITIATIVES_6-6-16
10-TOP-IT-INITIATIVES_6-6-16
 
Building Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT PracticesBuilding Security Into Your Cloud IT Practices
Building Security Into Your Cloud IT Practices
 
Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012
 
Securing todays mobile_workforce-white_paper
Securing todays mobile_workforce-white_paperSecuring todays mobile_workforce-white_paper
Securing todays mobile_workforce-white_paper
 
IBM Point of view -- Security and Cloud Computing (Tivoli)
IBM Point of view -- Security and Cloud Computing (Tivoli)IBM Point of view -- Security and Cloud Computing (Tivoli)
IBM Point of view -- Security and Cloud Computing (Tivoli)
 
IBM Point of View: Security and Cloud Computing
IBM Point of View: Security and Cloud ComputingIBM Point of View: Security and Cloud Computing
IBM Point of View: Security and Cloud Computing
 
u10a1 Security Plan-Beji Jacob
u10a1 Security Plan-Beji Jacobu10a1 Security Plan-Beji Jacob
u10a1 Security Plan-Beji Jacob
 

Mehr von Eiji Sasahara, Ph.D., MBA 笹原英司

米国大統領令を起点とする医療機器のゼロトラストとSBOM
米国大統領令を起点とする医療機器のゼロトラストとSBOM米国大統領令を起点とする医療機器のゼロトラストとSBOM
米国大統領令を起点とする医療機器のゼロトラストとSBOMEiji Sasahara, Ph.D., MBA 笹原英司
 
SDGs達成に向けたデジタルヘルスを支えるクラウドネイティブセキュリティ
SDGs達成に向けたデジタルヘルスを支えるクラウドネイティブセキュリティSDGs達成に向けたデジタルヘルスを支えるクラウドネイティブセキュリティ
SDGs達成に向けたデジタルヘルスを支えるクラウドネイティブセキュリティEiji Sasahara, Ph.D., MBA 笹原英司
 
ロボット支援手術(RAS)システムの脅威モデリング ~医療ロボットから自動車への横展開~
ロボット支援手術(RAS)システムの脅威モデリング ~医療ロボットから自動車への横展開~ロボット支援手術(RAS)システムの脅威モデリング ~医療ロボットから自動車への横展開~
ロボット支援手術(RAS)システムの脅威モデリング ~医療ロボットから自動車への横展開~Eiji Sasahara, Ph.D., MBA 笹原英司
 
ゲノムデータのサイバーセキュリティとアクセス制御
ゲノムデータのサイバーセキュリティとアクセス制御ゲノムデータのサイバーセキュリティとアクセス制御
ゲノムデータのサイバーセキュリティとアクセス制御Eiji Sasahara, Ph.D., MBA 笹原英司
 
プライバシーエンジニアリング技術標準化の欧米比較
プライバシーエンジニアリング技術標準化の欧米比較プライバシーエンジニアリング技術標準化の欧米比較
プライバシーエンジニアリング技術標準化の欧米比較Eiji Sasahara, Ph.D., MBA 笹原英司
 
バイオ/医療サプライチェーンのサイバーセキュリティリスク管理
バイオ/医療サプライチェーンのサイバーセキュリティリスク管理バイオ/医療サプライチェーンのサイバーセキュリティリスク管理
バイオ/医療サプライチェーンのサイバーセキュリティリスク管理Eiji Sasahara, Ph.D., MBA 笹原英司
 
最新事例に学ぶクラウドネイティブな医療AIのセキュリティ
最新事例に学ぶクラウドネイティブな医療AIのセキュリティ最新事例に学ぶクラウドネイティブな医療AIのセキュリティ
最新事例に学ぶクラウドネイティブな医療AIのセキュリティEiji Sasahara, Ph.D., MBA 笹原英司
 
Landscape of Cloud-Driven Digital Health Platform Market in Japan 2023
Landscape of Cloud-Driven Digital Health Platform Market in Japan 2023Landscape of Cloud-Driven Digital Health Platform Market in Japan 2023
Landscape of Cloud-Driven Digital Health Platform Market in Japan 2023Eiji Sasahara, Ph.D., MBA 笹原英司
 
バイオエコノミー産業の サイバーセキュリティ最新動向
バイオエコノミー産業の サイバーセキュリティ最新動向バイオエコノミー産業の サイバーセキュリティ最新動向
バイオエコノミー産業の サイバーセキュリティ最新動向Eiji Sasahara, Ph.D., MBA 笹原英司
 
[ハードウェア編] クラウドネイティブアーキテクチャとIoTセキュリティ・バイ・デザイン
[ハードウェア編] クラウドネイティブアーキテクチャとIoTセキュリティ・バイ・デザイン[ハードウェア編] クラウドネイティブアーキテクチャとIoTセキュリティ・バイ・デザイン
[ハードウェア編] クラウドネイティブアーキテクチャとIoTセキュリティ・バイ・デザインEiji Sasahara, Ph.D., MBA 笹原英司
 
「NISTIR 8320B ハードウェア対応セキュリティ:信頼されたコンテナプラットフォームにおけるポリシーベースのガバナンス」概説
「NISTIR 8320B ハードウェア対応セキュリティ:信頼されたコンテナプラットフォームにおけるポリシーベースのガバナンス」概説「NISTIR 8320B ハードウェア対応セキュリティ:信頼されたコンテナプラットフォームにおけるポリシーベースのガバナンス」概説
「NISTIR 8320B ハードウェア対応セキュリティ:信頼されたコンテナプラットフォームにおけるポリシーベースのガバナンス」概説Eiji Sasahara, Ph.D., MBA 笹原英司
 
「NIST SP 800-204C サービスメッシュを利用したマイクロサービスベースのアプリケーション向けDevSecOpsの展開」概説
「NIST SP 800-204C  サービスメッシュを利用したマイクロサービスベースのアプリケーション向けDevSecOpsの展開」概説「NIST SP 800-204C  サービスメッシュを利用したマイクロサービスベースのアプリケーション向けDevSecOpsの展開」概説
「NIST SP 800-204C サービスメッシュを利用したマイクロサービスベースのアプリケーション向けDevSecOpsの展開」概説Eiji Sasahara, Ph.D., MBA 笹原英司
 
情報プラットフォーム構築に必要なこと~欧州のユースケースに学ぶ医療・介護・健康情報連携基盤~
情報プラットフォーム構築に必要なこと~欧州のユースケースに学ぶ医療・介護・健康情報連携基盤~情報プラットフォーム構築に必要なこと~欧州のユースケースに学ぶ医療・介護・健康情報連携基盤~
情報プラットフォーム構築に必要なこと~欧州のユースケースに学ぶ医療・介護・健康情報連携基盤~Eiji Sasahara, Ph.D., MBA 笹原英司
 
セキュアなサーバーレスアーキテクチャ設計手法の概説 (v0)
セキュアなサーバーレスアーキテクチャ設計手法の概説 (v0)セキュアなサーバーレスアーキテクチャ設計手法の概説 (v0)
セキュアなサーバーレスアーキテクチャ設計手法の概説 (v0)Eiji Sasahara, Ph.D., MBA 笹原英司
 

Mehr von Eiji Sasahara, Ph.D., MBA 笹原英司 (20)

Metaverse and NFTs on the Healthcare Cloud
Metaverse and NFTs on the Healthcare CloudMetaverse and NFTs on the Healthcare Cloud
Metaverse and NFTs on the Healthcare Cloud
 
米国大統領令を起点とする医療機器のゼロトラストとSBOM
米国大統領令を起点とする医療機器のゼロトラストとSBOM米国大統領令を起点とする医療機器のゼロトラストとSBOM
米国大統領令を起点とする医療機器のゼロトラストとSBOM
 
SDGs達成に向けたデジタルヘルスを支えるクラウドネイティブセキュリティ
SDGs達成に向けたデジタルヘルスを支えるクラウドネイティブセキュリティSDGs達成に向けたデジタルヘルスを支えるクラウドネイティブセキュリティ
SDGs達成に向けたデジタルヘルスを支えるクラウドネイティブセキュリティ
 
ロボット支援手術(RAS)システムの脅威モデリング ~医療ロボットから自動車への横展開~
ロボット支援手術(RAS)システムの脅威モデリング ~医療ロボットから自動車への横展開~ロボット支援手術(RAS)システムの脅威モデリング ~医療ロボットから自動車への横展開~
ロボット支援手術(RAS)システムの脅威モデリング ~医療ロボットから自動車への横展開~
 
ゲノムデータのサイバーセキュリティとアクセス制御
ゲノムデータのサイバーセキュリティとアクセス制御ゲノムデータのサイバーセキュリティとアクセス制御
ゲノムデータのサイバーセキュリティとアクセス制御
 
プライバシーエンジニアリング技術標準化の欧米比較
プライバシーエンジニアリング技術標準化の欧米比較プライバシーエンジニアリング技術標準化の欧米比較
プライバシーエンジニアリング技術標準化の欧米比較
 
医療におけるサードパーティベンダーリスク管理
医療におけるサードパーティベンダーリスク管理医療におけるサードパーティベンダーリスク管理
医療におけるサードパーティベンダーリスク管理
 
バイオ/医療サプライチェーンのサイバーセキュリティリスク管理
バイオ/医療サプライチェーンのサイバーセキュリティリスク管理バイオ/医療サプライチェーンのサイバーセキュリティリスク管理
バイオ/医療サプライチェーンのサイバーセキュリティリスク管理
 
最新事例に学ぶクラウドネイティブな医療AIのセキュリティ
最新事例に学ぶクラウドネイティブな医療AIのセキュリティ最新事例に学ぶクラウドネイティブな医療AIのセキュリティ
最新事例に学ぶクラウドネイティブな医療AIのセキュリティ
 
医療クラウドにおけるランサムウェア攻撃予防対策
医療クラウドにおけるランサムウェア攻撃予防対策医療クラウドにおけるランサムウェア攻撃予防対策
医療クラウドにおけるランサムウェア攻撃予防対策
 
遠隔医療のクラウド利用とリスク管理
遠隔医療のクラウド利用とリスク管理遠隔医療のクラウド利用とリスク管理
遠隔医療のクラウド利用とリスク管理
 
Landscape of Cloud-Driven Digital Health Platform Market in Japan 2023
Landscape of Cloud-Driven Digital Health Platform Market in Japan 2023Landscape of Cloud-Driven Digital Health Platform Market in Japan 2023
Landscape of Cloud-Driven Digital Health Platform Market in Japan 2023
 
バイオエコノミー産業の サイバーセキュリティ最新動向
バイオエコノミー産業の サイバーセキュリティ最新動向バイオエコノミー産業の サイバーセキュリティ最新動向
バイオエコノミー産業の サイバーセキュリティ最新動向
 
[ハードウェア編] クラウドネイティブアーキテクチャとIoTセキュリティ・バイ・デザイン
[ハードウェア編] クラウドネイティブアーキテクチャとIoTセキュリティ・バイ・デザイン[ハードウェア編] クラウドネイティブアーキテクチャとIoTセキュリティ・バイ・デザイン
[ハードウェア編] クラウドネイティブアーキテクチャとIoTセキュリティ・バイ・デザイン
 
Cloud-Native Security on Digital Health-Telehealth Use Case
Cloud-Native Security on Digital Health-Telehealth Use CaseCloud-Native Security on Digital Health-Telehealth Use Case
Cloud-Native Security on Digital Health-Telehealth Use Case
 
「NISTIR 8320B ハードウェア対応セキュリティ:信頼されたコンテナプラットフォームにおけるポリシーベースのガバナンス」概説
「NISTIR 8320B ハードウェア対応セキュリティ:信頼されたコンテナプラットフォームにおけるポリシーベースのガバナンス」概説「NISTIR 8320B ハードウェア対応セキュリティ:信頼されたコンテナプラットフォームにおけるポリシーベースのガバナンス」概説
「NISTIR 8320B ハードウェア対応セキュリティ:信頼されたコンテナプラットフォームにおけるポリシーベースのガバナンス」概説
 
「NIST SP 800-204C サービスメッシュを利用したマイクロサービスベースのアプリケーション向けDevSecOpsの展開」概説
「NIST SP 800-204C  サービスメッシュを利用したマイクロサービスベースのアプリケーション向けDevSecOpsの展開」概説「NIST SP 800-204C  サービスメッシュを利用したマイクロサービスベースのアプリケーション向けDevSecOpsの展開」概説
「NIST SP 800-204C サービスメッシュを利用したマイクロサービスベースのアプリケーション向けDevSecOpsの展開」概説
 
情報プラットフォーム構築に必要なこと~欧州のユースケースに学ぶ医療・介護・健康情報連携基盤~
情報プラットフォーム構築に必要なこと~欧州のユースケースに学ぶ医療・介護・健康情報連携基盤~情報プラットフォーム構築に必要なこと~欧州のユースケースに学ぶ医療・介護・健康情報連携基盤~
情報プラットフォーム構築に必要なこと~欧州のユースケースに学ぶ医療・介護・健康情報連携基盤~
 
医療におけるブロックチェーン利用
医療におけるブロックチェーン利用医療におけるブロックチェーン利用
医療におけるブロックチェーン利用
 
セキュアなサーバーレスアーキテクチャ設計手法の概説 (v0)
セキュアなサーバーレスアーキテクチャ設計手法の概説 (v0)セキュアなサーバーレスアーキテクチャ設計手法の概説 (v0)
セキュアなサーバーレスアーキテクチャ設計手法の概説 (v0)
 

Kürzlich hochgeladen

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 

Kürzlich hochgeladen (20)

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 

MDM Key Components for BYOD and Company Devices

  • 1. Initiative 6 Mobile Device Management: Key Components, V1.0 September 2012 Document Sponsor
  • 2. CLOUD SECURITY ALLIANCE Mobile Device Management: Key Components, V1.0, September 2012 © 2012 Cloud Security Alliance All rights reserved. You may download, store, display on your computer, view, print, and link to the Cloud Security Alliance Security as a Service Implementation Guidance at http://www.cloudsecurityalliance.org, subject to the following: (a) the Guidance may be used solely for your personal, informational, non-commercial use; (b) the Guidance may not be modified or altered in any way; (c) the Guidance may not be redistributed; and (d) the trademark, copyright or other notices may not be removed. You may quote portions of the Guidance as permitted by the Fair Use provisions of the United States Copyright Act, provided that you attribute the portions to the Cloud Security Alliance Security as a Service Implementation Guidance Version 1.0 (2012). © Copyright 2012, Cloud Security Alliance. All rights reserved. 1
  • 3. CLOUD SECURITY ALLIANCE Mobile Device Management: Key Components, V1.0, September 2012 Contents Acknowledgments ......................................................................................................................................................3 SECTION 1: Introduction and Context ........................................................................................................................4 SECTION 2: MDM Key Components to Consider in Both Scenarios – BYOD or Company-Owned Devices ...............5 2.1 Policy ............................................................................................................................................................5 2.2 Risk Management .........................................................................................................................................5 2.3 Device Diversity / Degree of Freedom .........................................................................................................6 2.4 Configuration Management .........................................................................................................................6 2.5 Software Distribution ...................................................................................................................................6 2.6 Enterprise AppStore .....................................................................................................................................7 2.7 Content Library .............................................................................................................................................7 2.8 Procurement .................................................................................................................................................7 2.9 Provisioning ..................................................................................................................................................7 2.10 Device Policy Compliance & Enforcement .................................................................................................7 2.11 Enterprise Activation / Deactivation ..........................................................................................................8 2.12 Enterprise Asset Disposition .......................................................................................................................8 2.13 Process Automation ...................................................................................................................................8 2.14 User Activity Logging / Workplace Monitoring ..........................................................................................9 2.15 Security Settings .........................................................................................................................................9 2.16 Selective Wipe / Remote Wipe / Lock ........................................................................................................9 2.17 Identity Management / Authentication / Encryption ................................................................................9 SECTION 3: CONCLUSION ........................................................................................................................................ 11 © Copyright 2012, Cloud Security Alliance. All rights reserved. 2
  • 4. CLOUD SECURITY ALLIANCE Mobile Device Management: Key Components, V1.0, September 2012 Acknowledgments CSA Mobile Working Group Co-Chairs David Lingenfelter, Fiberlink Freddy Kasprzykowski, Microsoft Cesare Garlati, Trend Micro Initiative Lead Guido Sanchidrian, Symantec Contributors Jane Cosnowsky, Dell Sam Wilke Allen Lum, Control Solutions Jay Musterman, Cox Communications Somanath NG, Infosys Eiji Sasahara, IDC Alice Decker, Trend Micro Pamela Fusco, Virtuosi Group Nader Henein, Research In Motion Paul Madsen, Ping Identity Tyler Shields, Veracode Subbu Iyer, Zscaler © Copyright 2012, Cloud Security Alliance. All rights reserved. 3
  • 5. CLOUD SECURITY ALLIANCE Mobile Device Management: Key Components, V1.0, September 2012 SECTION 1: Introduction and Context With the growth in the number of applications, content, and data being accessed through a variety of devices, Mobile Device Management (MDM) is vital to managing the mobile enterprise. MDM is about much more than device management alone—it includes system-centric functionality to secure and manage data and applications, as well as information-centric functionality such as the delivery of the enterprise application store or content library. Planning Retirement / Acquisition Replacement Hardware Software Service Management Deployment MDM is a critical component of the device lifecycle, covering the device hardware, software, and attached services. Full lifecycle management is required, and IT is fully responsible for the company-owned devices, including setting hardware/OS standards, application support and enterprise liability. However, organizations might choose a “degree of freedom” for their users, such as increased hardware and OS choices by Bring-Your-Own- Device (BYOD) support, or might provide limited capabilities such as corporate email or web services only. Both will create shared responsibilities and a mix of enterprise and user liabilities that should be properly defined, communicated, and managed. © Copyright 2012, Cloud Security Alliance. All rights reserved. 4
  • 6. CLOUD SECURITY ALLIANCE Mobile Device Management: Key Components, V1.0, September 2012 SECTION 2: MDM Key Components to Consider in Both Scenarios – BYOD or Company-Owned Devices Software and Inventory Security Hardware •Device Diversity / Degree •Procurement •Security Settings of Freedom •Provisioning •Selectivve Wipe / Remote •Configuration •Device Policy Compliance Wipe / Lock Management & Enforcement •Identity Management / •Software Distribution •Enterprise Activation / Authentication / • Backup / Restore Deactivation Encryption • Patches / Fixes •Enterprise Assest • Updates Disposition • Synchronization •Process Automation •Enterprise AppStore •User Activity Logging / •Content Library Workplace Monitoring Policy / Risk Management 2.1 Policy Rating1: Must Have The definition and distribution of a policy is a critical prerequisite of mobile computing strategies. Organizations should assess the needs of the workforce and build or revise the mobile policy accordingly. Risk assessment and management should be performed to recognize the significance of IT and information risk, which both defines a basis for developing awareness and enables analysis of the business risk impact. A well-defined policy provides management direction and support for IT and information security and is the foundation for a solid MDM framework implementation. 2.2 Risk Management Rating: Must Have 1 The initial rating is based on common importance and risk level of each component. Depending on organizations individual risk assessment results, the rating might change dynamically case-by-case. © Copyright 2012, Cloud Security Alliance. All rights reserved. 5
  • 7. CLOUD SECURITY ALLIANCE Mobile Device Management: Key Components, V1.0, September 2012 Risk management means the entire process of analysis, planning, implementation, control, and monitoring of defined measurements and the enforced policy. Organizations should consider the impact of the introduction of mobile devices as end-point devices within their corporate network. If risks are identified, the appropriate mobile device policies can be applied. In an extreme case, if the risk is deemed too high, additional controls should be implemented to bring the risk to an acceptable level, allowing seamless access to IT resources from mobile devices. On the other hand, if the risk is low or non-existent, the organization can require minimal controls for the mobile devices, thereby reducing overall costs. As part of risk management, organizations should perform risk assessment periodically (i.e. once a year) or on- demand (i.e. introducing new devices, services, or significant infrastructure changes) to provide a temporary view of assessed risks and to review the risk management process, either in parts or entirely, and make necessary changes accordingly.2 2.3 Device Diversity / Degree of Freedom Rating: Optional Both scenarios—BYOD and company-owned devices—require segmentation and acceptable usage planning built on a multi-dimensional matrix, which includes the user’s role, responsibility (including ownership and support), data, networks and applications, and which states the user’s degree of freedom for each area. This planning also defines the capabilities provided, such as corporate email, web services, support, multimedia, specialized applications and services, corporate databases such as CRM, and analytics. 2.4 Configuration Management Rating: Must Have Configuration management involves automated configuration of device settings, such as password strength and policy, email, VPN and Wi-Fi. Configuration management aids in the elimination of user errors and minimizes vulnerabilities caused by misconfiguration, including configuration lockdown according to a degree-of-freedom definition, as well as hardware lockdown such as camera, Bluetooth, and Wi-Fi. Configuration management is also used in an effort to enforce corporate IT mobility policies. 2.5 Software Distribution Rating: Must Have Software distribution includes applications and software accessed over-the-air or by PC synchronization. It includes updates for applications or OSs, patches, fixes, backup and restore functionality, background synchronization, and basic file distribution capabilities. Backup and restore functionality accessed over-the-air or via PC-sync in particular becomes important in situations of device crash and replacements, intentional wipeout (i.e. in case of lost or stolen device) or unintentional wipeout (i.e. kids play with device and try password too often), so the device can be recovered quickly without significant productivity loss. Aligned to the corporate mobile policies it ensures the distribution of only security assessed mobile applications to the device. Along with Configuration Management, software distribution helps to enforce the corporate approach of black-listing and/or white-listing applications and other software on the device. Mobile Device Management systems 2 Visit European Network and Security Agency (ENISA) website at http://www.enisa.europa.eu/activities/risk-management/current- risk/risk-management-inventory/rm-isms for an introduction on Risk Management and Risk Assessment. © Copyright 2012, Cloud Security Alliance. All rights reserved. 6
  • 8. CLOUD SECURITY ALLIANCE Mobile Device Management: Key Components, V1.0, September 2012 generally do not have a capability to analyze mobile applications for security risk. The analysis of these applications should be conducted separately in order to populate the white-list and black-list approaches with actionable application security assessments. 2.6 Enterprise AppStore Rating: Optional An Enterprise AppStore ensures that only secure and trusted applications along with associated content will be deployed on mobile devices while providing several paths of accessibility: through deployment of mobile applications over-the-air, recommended apps from the public AppStore, or via a company-specific app repository. AppStores include appropriate code-signing of specialized or in-house applications to ensure the integrity of the application. Enterprise AppStores provide an excellent environment in the corporate mobile ecosystem to implement security testing and application whitelisting. 2.7 Content Library Rating: Optional A content library distributes corporate content, such as documents and multi-media videos, to provide a secure enterprise container with near-real-time updates and specific views. The library may include the secure usage of Cloud storage providers, or sandbox/virtualized environments to separate corporate content from private content. In the case of different containers it may be necessary to control applications and information differently with different policies depending on whether they or corporate or personal apps and information. 2.8 Procurement Rating: Must Have With devices evolving into application development and integration platforms, IT is likely taking ownership of the end-to-end solution by contracting wireless carriers and programs and managing service usage. However, the finance department maintains responsibility for monitoring and controlling mobility costs, such as contract and expense management. It is important to collaborate and align with Legal and HR departments to define certain terms and conditions in the policy and employee agreements. In particular, BYOD creates a mix of corporate and personal liability and responsibility. Liability for all parties should be clearly defined in these agreements and should include subjects such as private usage of corporate services, expense compensations, employee privacy policy, shared responsibilities for device and content security, misuse, secure wipe of the device including personal data in the event the device is lost or stolen, or the rights to control the device through a device management client. 2.9 Provisioning Rating: Optional Provisioning devices with a three year refresh is acceptable for company-owned devices, but IT cannot possibly manage employee-liable devices that are refreshed annually (or in even shorter cycles for smartphones and tablets). Expectations about end-user support should be clear and frequently refreshed, as self-help is often not accepted by some users, in particular those with brand new devices. 2.10 Device Policy Compliance & Enforcement Rating: Must Have © Copyright 2012, Cloud Security Alliance. All rights reserved. 7
  • 9. CLOUD SECURITY ALLIANCE Mobile Device Management: Key Components, V1.0, September 2012 Device policy compliance and enforcement is involved in device supply, control, and tracking. Asset inventory assessments are critical prerequisites for policy enforcement to comply with corporate and regulatory requirements around policies, encryption, jail-broken or rooted-device detection, and privacy-related separation of personal content vs. corporate content. Compliance and enforcement also includes approval and review processes of apps in the organization’s AppStore, as well as approval of mobile configurations to ensure that they meet the organization’s security policies before roll out. The organization will allow or deny access to devices based on their approval status. This is an ongoing monitoring and enforcement process, often described as Plan-Do-Check-Act approach of policies in various Information Security Management System standards and frameworks such as ISO 27001 or COBIT. It also requires alerts and notifications capabilities to provide asset reporting about devices, users, and apps. As part of the organizational infrastructure change control or similar processes, it is highly recommended to document that the policy and standard has been applied to the device and has been acknowledged by the user before the device is distributed. 2.11 Enterprise Activation / Deactivation Rating: Must Have Enterprise activation or deactivation is usually a self-service functionality that activates or connects mobile devices to the enterprise network, or that allows or denies access to users based on directory groups. A proper implementation of it (in particular an implementation as a self-service) will reduce the administrative burden of provisioning and re-provisioning at the IT department. User acceptance is an important factor of it and should be clarified and well communicated in the beginning. In particular in environments where users bring in their own devices, choosing enterprise activation will likely share certain details like operating system, device identifier, IMEI number, etc. as part of the provision process. The process can be either automated through a provisioning portal to enter the required details and follow the workflow to activate the device, or it can be a manual process where the administrator will do the complete activation by taking the required details from the user. In addition, after enterprise activation some characteristics of the device may be changed like enabled encryption, changed password settings, certain application restrictions, etc. 2.12 Enterprise Asset Disposition Rating: Must Have Enterprise asset disposition involves removal of physical devices by decommission or by releasing the device to the BYOD owner in case of device exchange, upgrade, or permanent decommissioning. Appropriate technical and procedural controls should be in place on inventory management, user receipts or acknowledgements, and related physical actions required for proper handling during decommissioning. It is important to securely wipe the corporate data from a personal device before it is decommissioned. If the device itself is not owned by enterprise, it should be handed over to the device owner ideally without touching the personal data, music, and apps. 2.13 Process Automation Rating: Optional Process automation creates and implements automated processes that link together people, processes, and technology. It automates regular tasks like device registration and lost devices (i.e. if a device is lost or stolen, an automated workflow should be initiated that remotely wipes the device and revokes particular access rights. Then, a new device should be provisioned, with appropriate pre-load and configuration prior delivery to the © Copyright 2012, Cloud Security Alliance. All rights reserved. 8
  • 10. CLOUD SECURITY ALLIANCE Mobile Device Management: Key Components, V1.0, September 2012 user). Process automation also includes technical tasks such as backup restore, as well as procedural tasks where human attestation is required (i.e. management sign-off for the order). 2.14 User Activity Logging / Workplace Monitoring Rating: Must Have More and more organizations are turning to workplace monitoring3 and data loss prevention (DLP) technology. Workplace monitoring is usually governed by a variety of privacy laws, rules, and regulations. In some countries, the laws on telecommunications regulate the monitoring of email and other electronic communications. In other countries, an employer’s rights to monitor employee communications may be governed by collective bargaining agreements, employment contracts, or general privacy and data protection legislation. It is important to understand that privacy is treated as a fundamental human right and, as such, cannot be bargained away. This becomes more complex with environments with both corporate supplied and BYOD devices where laws and regulations are significantly different. Organizations are highly recommended to seek legal counsel to understand the privacy and data protection laws of the individual countries in which they operate. 2.15 Security Settings Rating: Must Have According to company policy, security settings provide advanced security on devices irrespective of ownership. They set, deploy, and update settings like passwords, wipe, and application/resource restrictions, usually without any user intervention. Security can be broken into two basic components; user security and data security. While user and data security are tightly coupled there are some distinct differences which must be accounted for and sometimes handled quite differently. In both cases companies must take steps to protect the user and the data from potential threats. 2.16 Selective Wipe / Remote Wipe / Lock Rating: Must Have Selective wipe securely wipes the corporate data from a personal device, without touching the personal data, music, and apps. It will also delete documents from the user’s Content Library. If a device is lost or stolen, a remote wipe must be performed by either the administrator or the end user. The remote wipe will, in effect, wipe all information from the device returning it to factory default configuration. Similarly a Lock can be performed on a device by the administrator or end user to ensure that protection is in place should the device become temporarily misplaced. If the wrong password is entered multiple times, an automatic wipe will be triggered. 2.17 Identity Management / Authentication / Encryption Rating: Must Have Identity management, authentication, and encryption involved management of strong encryption of local data (device memory, external memory cards) and data in motion (such as email S/MIME encryption and authentication). It requires certificate distribution capabilities and certificate-based authentication (including device ID, OS version, phone number) to identify the device and user properly. Strong certificate-based 3 The term “monitoring” is used broadly to refer to any reading, collection, or storage of electronic communications. Monitoring is, therefore, more than the interception of communications in transit. Copying of employee emails for backups or scanning messages to detect viruses are both considered to be monitoring. © Copyright 2012, Cloud Security Alliance. All rights reserved. 9
  • 11. CLOUD SECURITY ALLIANCE Mobile Device Management: Key Components, V1.0, September 2012 authentication enables secure access to corporate email, web-based applications, VPN and Wi-Fi. It comes along with overlaying identity management processes and mechanisms by which enterprise employees are issued accounts and credentials required to provide access to the device, the business applications and services based on a context-aware policy that includes who they are, their role, their device, their network and their information and application. It could also enables employees access to cloud applications and services on mobile devices via single sign-on credentials and identity brokering to authenticate to third-party SaaS. © Copyright 2012, Cloud Security Alliance. All rights reserved. 10
  • 12. CLOUD SECURITY ALLIANCE Mobile Device Management: Key Components, V1.0, September 2012 SECTION 3: CONCLUSION Technology Process People Mobile devices have quickly become a mainstay in enterprise environments, and while mobile devices continue to be consumer driven in both form and function they have found their way into our day-to-day business lives. Mobile device management, like management of any technology or resource in the corporate space, has to start with the basic understanding of the key components of that eternal "people, process, technology" triangle. While most companies already have security policies in place, those policies need to be reviewed and possibly updated to account for the many components of mobile technology that have been spelled out in this document. Every company will have a different tolerance for risk and will adopt mobile technology in different ways, but there are still several fundamental components of mobile device management that have to be considered and incorporated into policy and practice to ensure that introducing this technology will not compromise security. As the mobile technology continues to advance, and new uses for it are discovered some of these key components outlined in this document may become more critical to a successful security strategy than others. There may also be new components to mobile device management that come into play as the technology continues to advance. Mobile devices are a great personal enabler and the consistent availability of mobile devices makes the integration of personal and business objectives almost inevitable. As such the Cloud Security Alliance Mobile Working group will continue to work on educating and developing guidance’s around mobile devices and how best to manage and integrate them into our work environments. © Copyright 2012, Cloud Security Alliance. All rights reserved. 11