Content library
Mobile device management
Device list maintenance in a mobile device management system

Other tasks from the same security theme

Task name
Priority
Status
Theme
Policy
Other requirements
Personnel guidelines for safe usage of mobile devices
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Remote work and mobile devices
Mobile device management
21
requirements

Examples of other requirements this task affects

6.2.1: Mobile device policy
ISO27 Full
10.1.1: Policy on the use of cryptographic controls
ISO27 Full
11.2.6: Security of equipment and assets off-premises
ISO27 Full
11.2.8: Unattended user equipment
ISO27 Full
12.6.2: Restrictions on software installation
ISO27 Full
See all related requirements and other information from tasks own page.
Go to >
Personnel guidelines for safe usage of mobile devices
1. Task description

There are separate instructions for staff to use mobile devices. The instructions cover:

  • restrictions on installing software and using various services on your organization's devices
  • procedures for the registration of new devices
  • requirements for physical protection of equipment and installation of updates
  • access control requirements
  • protecting your organization’s data with encryption, malware protection, and backup
  • the ability of the organization to remotely control the device
Process for theft / disappearance of mobile equipment
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Remote work and mobile devices
Mobile device management
7
requirements

Examples of other requirements this task affects

6.2.1: Mobile device policy
ISO27 Full
6.6.4: Fyysisten tilojen, laitteiden ja tulosteiden turvallisuus
Self-monitoring
8.1: User endpoint devices
ISO27k1 Full
CC6.7: Restriction and protection of information in transmission, movement or removal
SOC 2
See all related requirements and other information from tasks own page.
Go to >
Process for theft / disappearance of mobile equipment
1. Task description

Procedures have been established for the theft or loss of mobile devices.

The user may be required to e.g.:

  • change network access codes
  • report the situation to the IT department (and, if necessary, to the police or mobile access provider)
  • change any other credentials that may have been compromised

The organizational process in the event of a device loss may include e.g. clearing the device (at least the contents of the organization) remotely.

Safe disposal of laptops
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Remote work and mobile devices
Mobile device management
13
requirements

Examples of other requirements this task affects

8.3.2: Disposal of media
ISO27 Full
11.2.7: Secure disposal or re-use of equipment
ISO27 Full
PR.DS-3: Asset management
NIST
TEK-21: Sähköisessä muodossa olevien tietojen tuhoaminen
Julkri
7.10: Storage media
ISO27k1 Full
See all related requirements and other information from tasks own page.
Go to >
Safe disposal of laptops
1. Task description

The organization has defined procedures for the safe disposal of laptops that are no longer required.

Procedure for identifying software licensing requirements
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Remote work and mobile devices
Mobile device management
6
requirements

Examples of other requirements this task affects

18.1.2: Intellectual property rights
ISO27 Full
18: Compliance
ISO 27017
18.1: Compliance with legal and contractual requirements
ISO 27017
18.1.2: Intellectual property rights
ISO 27017
18.1.5: Regulation of cryptographic controls
ISO 27017
See all related requirements and other information from tasks own page.
Go to >
Procedure for identifying software licensing requirements
1. Task description

Installing commercially licensed software can cause a breach of the licence terms for the software. Organisation should have a procedure for identifying licensing requirements for before permitting any licensed software to be installed.

Particular attention should be paid to cases where the data system is elastic and scalable and can be run on more systems or processor cores than is permitted by the licence terms.

Third-party endpoint security monitoring
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Remote work and mobile devices
Mobile device management
1
requirements

Examples of other requirements this task affects

No items found.
See all related requirements and other information from tasks own page.
Go to >
Third-party endpoint security monitoring
1. Task description

The organization must have policies defined for monitoring the security of third party endpoint devices. Policies may include both technical and contractual practices.

In general, the organization must carefully consider the situation before granting access to the organization's data to third parties and their endpoint devices.

Enabling remote wipe on endpoint devices
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Remote work and mobile devices
Mobile device management
3
requirements

Examples of other requirements this task affects

7.9: Security of assets off-premises
ISO27k1 Full
See all related requirements and other information from tasks own page.
Go to >
Enabling remote wipe on endpoint devices
1. Task description

The organization must enable remote wiping on all mobile devices it manages (e.g., phones, laptops, tablets).

Remote wiping can help protect your device and the data it contains in the event of loss or theft. However, remote wiping must be used with extreme caution.

Enabling remote locating on endpoint devices
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Remote work and mobile devices
Mobile device management
1
requirements

Examples of other requirements this task affects

No items found.
See all related requirements and other information from tasks own page.
Go to >
Enabling remote locating on endpoint devices
1. Task description

The organization must enable remote locating on all mobile endpoints managed by the organization (e.g., phones, laptops, tablets).

Remote locating helps protect your device and the information it contains in the event of loss or theft.

Software firewall on endpoint devices
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Remote work and mobile devices
Mobile device management
6
requirements

Examples of other requirements this task affects

FWL-03: Host based firewall protection
Cyber Essentials
ARCHITECTURE-3: Implement IT and OT Asset Security as an Element of the Cybersecurity Architecture
C2M2: MIL1
DE.CM-1: The network is monitored to detect potential cybersecurity events.
CyFun
See all related requirements and other information from tasks own page.
Go to >
Software firewall on endpoint devices
1. Task description

All endpoint devices in the organization should be protected by a properly configured software firewall that monitors traffic, accepts compliant traffic, and monitors users.

A firewall protects against malware and attacks that come from inside or outside your organization's network.

Process for testing the compatibility of endpoints
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Remote work and mobile devices
Mobile device management
1
requirements

Examples of other requirements this task affects

No items found.
See all related requirements and other information from tasks own page.
Go to >
Process for testing the compatibility of endpoints
1. Task description

Poorly configured endpoints cause both a waste of resources but also potential security problems.

The organization shall define a process to identify potential compatibility issues between the endpoint devices used and the operating systems, information systems or applications.

Listing and monitoring allowed applications on endpoints
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Remote work and mobile devices
Mobile device management
6
requirements

Examples of other requirements this task affects

MWP-05: Whitelisting
Cyber Essentials
MWP: Application allow listing
Cyber Essentials
ARCHITECTURE-3: Implement IT and OT Asset Security as an Element of the Cybersecurity Architecture
C2M2: MIL1
DE.CM-3: Personnel activity is monitored to detect potential cybersecurity events.
CyFun
2.3.2: Configure clients so that only software known to the organisation is able to execute
NSM ICT-SP
See all related requirements and other information from tasks own page.
Go to >
Listing and monitoring allowed applications on endpoints
1. Task description

The organization must have list of approved applications, and application sources, that are allowed to be used on the organization's endpoint devices.

The organization should, if possible, execute management of approved software using automation for example with policies from mobile device management system.

Mobile device security policies and their monitoring
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Remote work and mobile devices
Mobile device management
8
requirements

Examples of other requirements this task affects

6.2.1: Mobile device policy
ISO27 Full
8.1: User endpoint devices
ISO27k1 Full
CC6.7: Restriction and protection of information in transmission, movement or removal
SOC 2
6.10: Työasemien, mobiililaitteiden ja käyttöympäristön tukipalveluiden hallinta
Tietoturvasuunnitelma
3.1.4: Management of IT and mobile data storage devices
TISAX
See all related requirements and other information from tasks own page.
Go to >
Mobile device security policies and their monitoring
1. Task description

The security policies defined in the mobile device management system aim to protect the organization’s data. For example, to reduce the risk of losing devices, you can specify that the device be locked after 5 minutes of inactivity or that the device be completely wiped after 3 failed login attempts.

It may make sense to test new policies first with a small group of users. Policies also require oversight. You can initially select a setting for policies that informs the administrator of settings that violate the policy, but does not completely block access.

Using a mobile device management system
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Remote work and mobile devices
Mobile device management
11
requirements

Examples of other requirements this task affects

6.2.1: Mobile device policy
ISO27 Full
8.1: User endpoint devices
ISO27k1 Full
CC6.7: Restriction and protection of information in transmission, movement or removal
SOC 2
3.1.4: Management of IT and mobile data storage devices
TISAX
DE.CM-5: Unauthorized mobile code is detected.
CyFun
See all related requirements and other information from tasks own page.
Go to >
Using a mobile device management system
1. Task description

Mobile Device Management (MDM) helps secure and manage staff mobile devices, whether they are iPhones, iPads, Android devices, or Windows devices. E.g. a Microsoft 365 subscription includes the basics of mobile device management.

Mobile device management system can be used to e.g. configure device security policies, wipe remotely and get accurate device usage reporting.

Endpoint PIN-protection and automated locking
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Remote work and mobile devices
Mobile device management
5
requirements

Examples of other requirements this task affects

11.2.9: Clear desk and clear screen policy
ISO27 Full
6.6.4: Fyysisten tilojen, laitteiden ja tulosteiden turvallisuus
Self-monitoring
SEC-06: Reviewing password practices on password protected systems
Cyber Essentials
7.7: Clear desk and clear screen
ISO27k1 Full
See all related requirements and other information from tasks own page.
Go to >
Endpoint PIN-protection and automated locking
1. Task description

Devices should be protected against unauthorized access to or disclosure of information stored on or processed by them. Mandatory protection of the devices, e.g. with a 5-digit PIN code before each use, and automatic locking of the devices, e.g. after 5 minutes of inactivity, can help.

Endpoint security management system
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Remote work and mobile devices
Mobile device management
15
requirements

Examples of other requirements this task affects

6.2.1: Mobile device policy
ISO27 Full
13.1.1: Network controls
ISO27 Full
PR.PT-4: Communications and control networks
NIST
HAL-19: Tietojen käsittely
Julkri
8.1: User endpoint devices
ISO27k1 Full
See all related requirements and other information from tasks own page.
Go to >
Endpoint security management system
1. Task description

Endpoint security management system can be used to demand the desired security criteria from the devices before they are allowed to connect to the network resources. Devices can be laptops, smartphones, tablets or industry-specific hardware.

Criteria for the use of network resources may include e.g. approved operating system, VPN and antivirus systems, and the timeliness of these updates.

Device list maintenance in a mobile device management system
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Remote work and mobile devices
Mobile device management
4
requirements

Examples of other requirements this task affects

8.1.1: Inventory of assets
ISO27 Full
1.2.1: Establish a process to identify devices and software in use at the organisation
NSM ICT-SP
1.2.3: Identify devices in use at the organisation
NSM ICT-SP
See all related requirements and other information from tasks own page.
Go to >
Device list maintenance in a mobile device management system
1. Task description

The devices must be registered in the mobile device management system in order to obtain a unique identifier for the device and to use the management features. When purchasing new devices, the devices are always registered in the mobile device management system.

Universal cyber compliance language model: Comply with confidence and least effort

In Cyberday, all frameworks’ requirements are mapped into universal tasks, so you achieve multi-framework compliance effortlessly.

Security frameworks tend to share the common core. All frameworks cover basic topics like risk management, backup, malware, personnel awareness or access management in their respective sections.
Cyberday’s universal cyber security language technology creates you a single security plan and ensures you implement the common parts of frameworks just once. You focus on implementing your plan, we automate the compliance part - for current and upcoming frameworks.
Start your free trial
Get to know Cyberday
Start your free trial
Cyberday is your all-in-one solution for building a secure and compliant organization. Whether you're setting up a cyber security plan, evaluating policies, implementing tasks, or generating automated reports, Cyberday simplifies the entire process.
With AI-driven insights and a user-friendly interface, it's easier than ever to stay ahead of compliance requirements and focus on continuous improvement.
Clear framework compliance plans
Activate relevant frameworks and turn them into actionable policies tailored to your needs.
Credible reports to proof your compliance
Use guided tasks to ensure secure implementations and create professional reports with just a few clicks.
AI-powered improvement suggestions
Focus on the most impactful improvements in your compliance with help from Cyberday AI.