Mobile Devices

Mobile Devices
Here is a checklist on how to access your organization’s mobile devices as well as your own personal devices (BYOD) at workspace.

Sub Category Checklist Threat
BYOD Policy Check if the BYOD OS is Rooted/Jail broken/Pirated Rooted or Jail break OS can have malicious programs or Virus in it. This will make our other network devices vulnerable.
Check BYOD operating systems are up-to-date. Outdated program is always open to vulnerability.
Check if MDM Tools are installed. Confidentiality cannot be kept if lost or stolen.
Check if MDM Tools are up-to-date Outdated program is always open to vulnerability.
Check if all installed applications are up-to-date Outdated program is always open to vulnerability.
Check if all installed applications are installed from the trustable source. Program installed from untrusted source is always open to vulnerability.
Check application permissions – Check if any application is given unwanted permission when it is installed. Unwanted permission can cause vulnerability.
Check if any unwanted or Unauthorized personnel using BYOD devices. Can cause information theft.
Make sure BYOD devices which are connected to the network (wired or wireless) are are known to the network. Eg: Let only MAC address bound devices to enter into the network. Unauthorized person can get access.
Check and make sure BYOD’s using secure mechanism for connecting to the internet. Unauthorized person can access.
Check if there any cloud storage services in use, if yes, make sure its secure from theft and the service in uninterruptible in the future also. Data theft