13.07.2015 Views

Mobile Device Management: Key Components, V1.0

Mobile Device Management: Key Components, V1.0

Mobile Device Management: Key Components, V1.0

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CLOUD SECURITY ALLIANCE <strong>Mobile</strong> <strong>Device</strong> <strong>Management</strong>: <strong>Key</strong> <strong>Components</strong>, <strong>V1.0</strong>, September 2012SECTION 2: MDM <strong>Key</strong> <strong>Components</strong> to Consider inBoth Scenarios – BYOD or Company-Owned<strong>Device</strong>sSoftware andHardware•<strong>Device</strong> Diversity / Degreeof Freedom•Configuration<strong>Management</strong>•Software Distribution• Backup / Restore• Patches / Fixes• Updates• Synchronization•Enterprise AppStore•Content LibraryInventory•Procurement•Provisioning•<strong>Device</strong> Policy Compliance& Enforcement•Enterprise Activation /Deactivation•Enterprise AssestDisposition•Process Automation•User Activity Logging /Workplace MonitoringSecurity•Security Settings•Selectivve Wipe / RemoteWipe / Lock•Identity <strong>Management</strong> /Authentication /EncryptionPolicy / Risk <strong>Management</strong>2.1 Policy Rating 1 : Must HaveThe definition and distribution of a policy is a critical prerequisite of mobile computing strategies. Organizationsshould assess the needs of the workforce and build or revise the mobile policy accordingly. Risk assessment andmanagement should be performed to recognize the significance of IT and information risk, which both defines abasis for developing awareness and enables analysis of the business risk impact. A well-defined policy providesmanagement direction and support for IT and information security and is the foundation for a solid MDMframework implementation.1 The initial rating is based on common importance and risk level of each component. Depending on organizations individual riskassessment results, the rating might change dynamically case-by-case.© Copyright 2012, Cloud Security Alliance. All rights reserved. 5

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!