What is this guide about?
A growing and now key component for enterprise information sharing is mobile devices, which are often furnished by employees themselves or issued by the organization. These devices provide access to data and resources vital for organizations to accomplish their mission while providing employees with the flexibility to perform their daily activities. As employees use these devices to perform everyday enterprise tasks, organizations are challenged with ensuring that devices securely process, transmit, and store sensitive data.
Mobile devices bring unique threats to the enterprise that need to be addressed in a manner distinct from traditional desktop platforms. This includes securing against different types of network-based attacks on devices that generally have an always-on connection to the internet, malicious or risky apps that compromise the data that devices can access, and phishing attempts that try to collect user credentials or entice a user to install software. Additionally, this guide addresses how to reduce risks to individuals through privacy protections.
NIST’s National Cybersecurity Center of Excellence (NCCoE) and its industry collaborators built an example solution demonstrating how organizations can use a standards-based approach and commercially available technologies to meet their security and privacy needs for using mobile devices to access enterprise resources.
Download the full draft practice guide.
We look forward to receiving your comments on this draft guide regarding the approach, the architectures, and possible alternatives.
Read more at: Imperial Valley News