Wisegate Sample Byod Policy
Wisegate Sample Byod Policy
Wisegate Sample Byod Policy
Introduction
Securing corporate information while allowing employees to use their personal mobile devices on the
corporate network is still a major challenge for most companies. Knowing how to create mobile device
policies that balance the needs of both employees and the company is difficult.
Originally developed by a Wisegate member from a Fortune 1000 Insurance company, this sample
Corporate Mobile Device Acceptable Use and Security Policy can help you get started in creating or
updating your own policy.
With exclusive access to a vetted group of senior-level IT security professionals, Wisegate members are
able to gain insights into what their peers are doing and learn from their successes and failures. This
sample Corporate Mobile Device Acceptable Use and Security Policy is an example of the kind of
information Wisegate members typically share with each other.
Would you like to join us? Go to wisegateit.com to learn more and to submit your request for
membership.
Table of Contents
Policy Development Project Introduction .................................................................... 4
Material Under Review or Development ................................................ 4
Active Policy .................................................................................... 4
Objective and Scope ......................................................................... 4
End-User Policy .............................................................................................................. 5
Policy Artifact ................................................................................... 5
Technical Policy ................................................................................ 9
Secure Configuration Policy ....................................................................................... 10
Blackberry Device Support ............................................................... 10
Apple Device Support ...................................................................... 10
Android Device Support ................................................................... 10
Mobile Device Application Development ............................................. 10
General Information Security Controls ............................................... 10
Socialization and Communication Plan ..................................................................... 18
Review Ladder................................................................................ 18
Authorization ................................................................................. 21
Communications and Publishing Plan ................................................. 21
Active Policy
The written material actively affecting control. This is typically a policy, standard, process, guideline,
directive, etc.
User Policy
Smartphone Acceptable Use Policy version XX.
(link to published material)
Configuration Policy
Wireless Device Communications and Connectivity version XX.
(link to published material)
Technical Operations
ITS
ITS
End-User Policy
Policy Artifact
This section contains the policy content that will be published to all employees.
Policy Title
Existing New
Purpose
The purpose of this policy is to establish the criteria governing the authorized use
of personal or corporate owned smartphone and tablet (mobile) devices where
the owner has established access to the Company’s Systems enabling them to
send and receive workrelated email messages and conduct other company
business.
Policy Statement
Employees may use approved personally owned and corporate owned mobile
devices to access the Company messaging system and the approved Corporate
wireless network as necessary in the course of their normal business routines in
support of the Company's published goals and objectives.
User Responsibility
General
User agrees to a general code of conduct that recognizes the need to protect
confidential data that is stored on, or accessed using, a mobile device. This code
of conduct includes but is not limited to:
• Doing what is necessary to ensure the adequate physical security of
the device
• Maintaining the software configuration of the device – both the
operating system and the applications installed.
• Preventing the storage of sensitive company data in unapproved
applications on the device.
• Ensuring the device’s security controls are not subverted via hacks,
jailbreaks, security software changes and/or security setting changes
• Reporting a lost or stolen device immediately
Enforcement
Any user found to have violated this policy may be subject to disciplinary action,
including but not limited to:
• Account suspension
• Revocation of device access to the Company System
• Data removal from the device
• Employee termination
Technical Policy
This section reflects changes needed to existing technical policy material.
Approved Technology
All wireless LAN access provisioned to the Company Network must use
corporate-approved vendor products and security configurations. Corporate
owned assets, and those explicitly allowed per the Mobile Device Policy, are the
only devices that can be approved and authorized for use on the Company
Network.
Home-based wireless networks are not supported by the Company. If a home-
based wireless network is encrypted using WPA or later Corporate equipment
may be configured for access to the network.
Control Risks
While the decision to allow employees to use mobile and personal devices, to
improve productivity and work efficiency, the Company is doing so ever-aware of
the risks outlined below:
Malware
Introducing malware to the Company network. It is already difficult to maintain
network security with standardized devices via controlled access. For this reason
the Company has screened the multitude of non-standardized devices end-users
might wish to connect to the Company network and selected solutions that
enable both flexibility and essential controls.
• Personal e-mail access via SMTP on any Corporate Wi-Fi network is not
supported
Mobile Device Management
Mobile Device Management (MDM) solutions are the foundation of a secure
mobile device deployment.
• MDM makes configuration control possible.
• Risk: MDM solutions are not necessarily security-centric and do not
typically cover all the security fundamentals. The MDM tools reality is
that most Mobile Device Management solutions provide a set of
capabilities that address only some of the security problems presented
by Mobile Devices.
• Compensating Control: The essential MDM use cases such as
enforcing a pass code, encryption of stored data and wiping a device if
it gets lost—are being fulfilled by the MDM vendor selected by the
Company.
Corporate and personal data separation
Corporate data will be kept separate from personal data.
User Awareness of Their Responsibilities
All authorized mobile device users will be reminded every six months of their
responsibilities.
About Personal Data Access
General Council wishes to understand what access Corporate has to personal
data on a personal device.
• Can Corporate monitor or observe the data?
NO, we have the ability to monitor encryption, security controls,
installed applications, app distribution, MDM profiles, Device
Jailbroken, but not data –with exception of Corporate configured (e-
mail, calendar, contacts).
• Is this access limited to deletion only?
YES, all Corporate configured data is removed once un-enrolled from
MDM or reset to factory default.(this excludes any data manually
moved to other applications on the device by the user).
Compliance and Reporting
Compliance and Security Reporting – The security solution must be able to
report what controls policy has been deployed, that a device is not “rooted” or
“Jailbroken” and that policy controls applied are in still in place.
place for SMS messages but is in place for all e-mail through our standard
archival system.
Malware Control
Inevitable malware threats remain a concern on all computing platforms. Mobile
devices are not alone here. The Apple IOS provides a software quality
ecosystem and “application sandboxing” to counter this threat to some extent.
• If an application in the Apple “App Store” is discovered to be malware,
Apple has the ability to “kill” the application and remove it from the
installed base. This is a significant deterrent to a would-be iPhone/iPad
malware writer. What is the point of writing malware if the planet’s
population of IOS devices can be cleaned of it in the span of 24 hours
once discovered?
• The Apple IOS also employs a concept known as “application
sandboxing” which makes it impossible for one application to invade
the domain of another.
Policy Management - Limited
Capabilities in the Policy Management realm are lack luster for mobile devices in
general. It is a plus that Apple IOS limits what can be done between applications
(as mentioned in the Malware section above). A comparative few (approximately
20) policy control points exist for ActiveSync (among which few are actually
considered useful) on mobile devices. Comparatively, there is a myriad of policy
attributes and actions that can be applied to a Laptop device or to a BlackBerry
device. It is assumed that mobile device controls will be enhanced to
address this problem when the technical means to do so is viable.
• O2
• Palm OS
• Audiovox
• Any platform not explicitly named in the “Multiple Device Platforms
Allowed” section of this document.
Self Service Device Management
• Enrollment of Personal Devices
• Wipe of Lost or Stolen Devices
• Passcode Reset
• Device Locator (where did I put that?)
Backup and Recovery
• What is the responsibility the user has for backing up data?
• What is the state of Corporate data that resides in a device backup file?
• Can Corporate data in a device backup file be restored without the policy
oversight?
Application Restrictions
• Games
• Gambling
• Instant Messaging Clients
• Pornography
• Guns
Forensics and Litigation Support Services
Controls Compliance Testing and Reporting
• Manual
• Automatic
Application Providence – Signed by Vendor
Control Validation Testing
Are the policies translating into effective controls, especially when control
requires user action?
Review Ladder
Phase is complete
Phase in progress
Accountable MM/DD/YYYY
(Delegate)
Accountable MM/DD/YYYY
(Delegate)
Accountable MM/DD/YYYY
(Delegate)
Accountable MM/DD/YYYY
(Delegate)
Informed MM/DD/YYYY
Authorization
Date Date Comments
Default: the date following the final day of last
Approval MM/DD/YYYY draft review cycle
Approval Matter
Evidence of approval of the new matter is inserted here.
< PDF versions of email messages containing approval are inserted here>
2. Policy Portal update will be made MM/DD/YYYY Target: 5 days after approval date
w w w. w is e ga t e i t . c o m