Specifying security requirements for mobile devices and clients, including endpoint protection, hardening, and configuration
Mobile devices create a significant challenge to security personnel. The cybersecurity architect should help build a strategy that covers capabilities for hardening devices. The Security Compliance Toolkit can be used for security baselines on Windows devices, servers, and client endpoints. Mobile devices within a company are not simply Windows operating systems. Operating systems for these mobile devices also include iOS, macOS, and Android. In addition to the multiple operating systems, these devices are accessing resources from different networks, some of which are public and unsecured.
Security for these mobile devices requires a company to review and monitor that these devices are maintaining compliance with the company’s security benchmarks. Mobile Device Management (MDM) or Mobile Application Management (MAM) will allow device administrators...