Mobile Device Management Controls

Purpose

Bramble governance of risks associated with mobile devices, regardless if the device is owned by the organization, its users or trusted third-parties. Wherever possible, technologies are employed to centrally manage mobile device access and data storage practices to restrict logical and physical access to the devices, as well as the amount and type of data that can be stored, transmitted or processed.

Scope

This applies to all Bramble Group, Corp. employees.

Ownership

This control is owned by IT Ops

Controls

Control Number Control Title Control Statement Goal TOD TOE
MDM-01 Centralized Management of Mobile Devices Bramble Group Corp. has implemented mechanisms to develop, govern & update procedures to facilitate the implementation of mobile device management controls. Does the organization develop, govern & update procedures to facilitate the implementation of mobile device management controls? 1. Identify policies, procedures, or other relevant documentation that govern mobile device management controls.

2. Interview key organizational personnel within Bramble to discuss high level workflows that support the implementation of mobile device management controls.

3: Examine policies and procedures for: purpose; scope; roles and responsibilities; management commitment; coordination among organizational entities; compliance; and implementation requirements.
1. Examine relevant documentation and configurations that support the facilitation of mobile device management controls over security software, infrastructure, architectures and they relate to mobile device management controls.
MDM-03 Full Device & Container-Based Encryption Bramble Group Corp. has implemented cryptographic mechanisms to protect the confidentiality and integrity of information on mobile devices through full-device or container encryption. Are cryptographic mechanisms utilized to protect the confidentiality and integrity of information on mobile devices through full-device or container encryption? 1. Identify policies, procedures, or other relevant documentation that facilitate the implementation of mechanisms to protect the confidentiality and integrity of information on mobile devices through full-device or container encryption.

2. Interview key organizational personnel within Bramble to discuss high level workflows that support the implementation of confidentiality and integrity of information following mobile device management controls.

3. Examine policies and procedures for: purpose; scope; roles and responsibilities; management commitment; coordination among organizational entities; compliance; and implementation requirements.
1. Examine relevant documentation and configurations that support the facilitation of confidentiality and integrity of information on mobile devices accessing security software, infrastructure, architectures as they relate to mobile device management controls.

2. Pull a population of all managed mobile devices connected to Bramble’s network.

3. Inspect a sample of evidence to confirm cryptographic protections have been implemented according to TOD.
  • Test of Design - (TOD) – verifies that a control is designed appropriately and that it will prevent or detect a particular risk.
  • Test of Operating Effectiveness - (TOE) - used for verifying that the control is in place and it operates as it was designed.

Policy Reference