Mobile Device Management: Key Components, V1.0: September 2012
Mobile Device Management: Key Components, V1.0: September 2012
Document
Sponsor
CLOUD SECURITY ALLIANCE Mobile Device Management: Key Components, V1.0, September 2012
All rights reserved. You may download, store, display on your computer, view, print, and link to the Cloud
Security Alliance Mobile Device Management Key Components at http://www.cloudsecurityalliance.org, subject
to the following: (a) the Document may be used solely for your personal, informational, non-commercial use; (b)
the Document may not be modified or altered in any way; (c) the Document may not be redistributed; and (d)
the trademark, copyright or other notices may not be removed. You may quote portions of the Document as
permitted by the Fair Use provisions of the United States Copyright Act, provided that you attribute the portions
to the Cloud Security Alliance Mobile Device Management Key Components (2012).
Contents
Acknowledgments ......................................................................................................................................................3
SECTION 1: Introduction and Context ........................................................................................................................4
SECTION 2: MDM Key Components to Consider in Both Scenarios – BYOD or Company-Owned Devices ...............5
2.1 Policy ............................................................................................................................................................5
2.2 Risk Management .........................................................................................................................................6
2.3 Device Diversity / Degree of Freedom .........................................................................................................6
2.4 Configuration Management .........................................................................................................................6
2.5 Software Distribution ...................................................................................................................................6
2.6 Enterprise AppStore .....................................................................................................................................7
2.7 Content Library .............................................................................................................................................7
2.8 Procurement .................................................................................................................................................7
2.9 Provisioning ..................................................................................................................................................7
2.10 Device Policy Compliance & Enforcement .................................................................................................8
2.11 Enterprise Activation / Deactivation ..........................................................................................................8
2.12 Enterprise Asset Disposition .......................................................................................................................8
2.13 Process Automation ...................................................................................................................................8
2.14 User Activity Logging / Workplace Monitoring ..........................................................................................9
2.15 Security Settings .........................................................................................................................................9
2.16 Selective Wipe / Remote Wipe / Lock ........................................................................................................9
2.17 Identity Management / Authentication / Encryption ................................................................................9
SECTION 3: CONCLUSION ........................................................................................................................................ 11
Acknowledgments
CSA Mobile Working Group Co-Chairs
Initiative Lead
Contributors
Planning
Retirement /
Acquisition
Replacement Hardware
Software
Service
Management Deployment
MDM is a critical component of the device lifecycle, covering the device hardware, software, and attached
services.
Full lifecycle management is required, and IT is fully responsible for the company-owned devices, including
setting hardware/OS standards, application support and enterprise liability. However, organizations might
choose a “degree of freedom” for their users, such as increased hardware and OS choices by Bring-Your-Own-
Device (BYOD) support, or might provide limited capabilities such as corporate email or web services only. Both
will create shared responsibilities and a mix of enterprise and user liabilities that should be properly defined,
communicated, and managed.
Software and
Inventory Security
Hardware
•Device Diversity / Degree •Procurement •Security Settings
of Freedom •Provisioning •Selectivve Wipe / Remote
•Configuration •Device Policy Compliance Wipe / Lock
Management & Enforcement •Identity Management /
•Software Distribution •Enterprise Activation / Authentication /
• Backup / Restore Deactivation Encryption
• Patches / Fixes •Enterprise Assest
• Updates Disposition
• Synchronization •Process Automation
•Enterprise AppStore •User Activity Logging /
•Content Library Workplace Monitoring
1
The initial rating is based on common importance and risk level of each component. Depending on organizations individual risk
assessment results, the rating might change dynamically case-by-case.
As part of risk management, organizations should perform risk assessment periodically (i.e. once a year) or on-
demand (i.e. introducing new devices, services, or significant infrastructure changes) to provide a temporary
view of assessed risks and to review the risk management process, either in parts or entirely, and make
necessary changes accordingly. 2
2
Visit European Network and Security Agency (ENISA) website at http://www.enisa.europa.eu/activities/risk-management/current-
risk/risk-management-inventory/rm-isms for an introduction on Risk Management and Risk Assessment.
Configuration Management, software distribution helps to enforce the corporate approach of black-listing
and/or white-listing applications and other software on the device. Mobile Device Management systems
generally do not have a capability to analyze mobile applications for security risk. The analysis of these
applications should be conducted separately in order to populate the white-list and black-list approaches with
actionable application security assessments.
an automated workflow should be initiated that remotely wipes the device and revokes particular access rights.
Then, a new device should be provisioned, with appropriate pre-load and configuration prior delivery to the
user). Process automation also includes technical tasks such as backup restore, as well as procedural tasks
where human attestation is required (i.e. management sign-off for the order).
3
The term “monitoring” is used broadly to refer to any reading, collection, or storage of electronic communications. Monitoring is,
therefore, more than the interception of communications in transit. Copying of employee emails for backups or scanning messages to
detect viruses are both considered to be monitoring.
SECTION 3: CONCLUSION
Technology
Process People
Mobile devices have quickly become a mainstay in enterprise environments, and while mobile devices continue
to be consumer driven in both form and function they have found their way into our day-to-day business
lives. Mobile device management, like management of any technology or resource in the corporate space, has
to start with the basic understanding of the key components of that eternal "people, process, technology"
triangle. While most companies already have security policies in place, those policies need to be reviewed and
possibly updated to account for the many components of mobile technology that have been spelled out in this
document. Every company will have a different tolerance for risk and will adopt mobile technology in different
ways, but there are still several fundamental components of mobile device management that have to be
considered and incorporated into policy and practice to ensure that introducing this technology will not
compromise security.
As the mobile technology continues to advance, and new uses for it are discovered some of these key
components outlined in this document may become more critical to a successful security strategy than
others. There may also be new components to mobile device management that come into play as the
technology continues to advance. Mobile devices are a great personal enabler and the consistent availability of
mobile devices makes the integration of personal and business objectives almost inevitable. As such the Cloud
Security Alliance Mobile Working group will continue to work on educating and developing guidance’s around
mobile devices and how best to manage and integrate them into our work environments.