Protection and governance options
Multiple options are available to provide the appropriate security and governance controls for BYOD scenarios. With the shift in security approaches from perimeter networks to end user devices, a defense-in-depth and layered approach should be taken; you can then identify which combination of options is required for your specific business requirements, technical capabilities, and end user scenarios.
The following topics will be covered in this section, specifically those related to BYOD and CYOD scenarios:
- Identity and access management
- Information protection
- Device configuration
- Application management:
- Provisioning packages
- Mobile application management
Identity and access management
In a scenario where a corporate-owned device (COD) is on the company network being Active Directory (AD) joined, then identity and access management (IAM) is generally controlled by AD and Group Policy. A device may even be Azure AD joined...