An information security manager is implementing a bring your own device (BYOD) program. Which of the following would BEST ensure that users adhere to the security standards?
A.
Publish the standards on the intranet landing page.
Questions to ask the IM manager,
1. If i don't have a policy but a MDM - would I be able to ensure security?
2. If i have a policy but not a MDM - would I be able to ensure seucurity?
I would say the likelihood of saying Yes 1 more over than 2, technincal control is generally more effective than administrative controls in the real world.
It is B as an AUP would heavily rely on a voluntary or trust-based compliance.
A technical solution would provide the means to enforce any security standards posed by the policy.
I think the key word in the question is "adhere" the ONLY thing that would do this is C deploy and MDM. An AUP is also a must but it won't make users "adhere to the security standards.
The questions ask for a deterrent control for the users to abide by. Standards are created from policies so Policies is the correct answer, if the question leans towards a corrective control then it will be MDM. Question clearly states what has to be done on the user side so that the user abide by the standards, it will be policy.
C is the best choice, we need to understand that this is managerial position, and the most thing is policy has to be establish first, then the next is how it will be implemented now MDM comes it which are works for engineer.
Modern tendencies tend to encourage implementing MDM for BYOD, as that's the only way to guarantee adherence to standards. BTW, the questions also says "standards", not "policies" so AUP is also not as relevant here. You are enforcing security standards (and policies if you have them) via MDM.
Deploying a device management solution is the most effective way to ensure that users adhere to security standards in a bring your own device (BYOD) program. A device management solution allows the organization to enforce security policies, monitor compliance, and remotely manage and secure devices that are used to access organizational resources. This ensures that devices conform to security standards and reduces the risk of security incidents associated with BYOD.
Implementing a device management solution allows the organization to enforce security standards on the devices that connect to the corporate network. This can include features such as device authentication, encryption, remote wiping capabilities, and other security controls. By deploying a device management solution, the organization can have better control over the security posture of devices used in the BYOD program.
While publishing standards on the intranet (option A) and establishing an acceptable use policy (option C) are important communication measures, they may not guarantee adherence. Monitoring user activities on the network (option D) is reactive and may not proactively enforce security standards. A device management solution provides a more proactive and effective means of ensuring adherence to security standards for BYOD.
It is very straightforward. To make an user adhere to standard must have an acceptable use policy which they are supposed to abide by. The policies can be imported into device management solution as a technical control to ensure the policy is enforced thus answer C should be appropriate and should already include option B.
C. Establish an acceptable use policy.
An acceptable use policy (AUP) outlines the rules and guidelines that users must follow when using their own devices for work purposes. It sets clear expectations regarding security practices, data protection, and acceptable behaviors. Users are required to read, understand, and agree to the AUP before they are granted access to company resources with their personal devices.
I am going with B here because the emphasized word was "Ensure". Users can read and sign AUPs till the cows come home, but that does not necessarily mean they will adhere to it. If the bolded word was "First" or "Primarily" then maybe AUPs will be the correct answer. If Device management is deployed, people will have no option but to be on their best behavior. (Yes, I know it is their personal device) but if they are conducting organization business with it, and you agree to use your device, there will be some management don't you agree?
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
DASH_v
Highly Voted 1 year, 5 months agoServerBrain
Most Recent 1 month, 2 weeks agovassof95
2 months, 2 weeks agoCyber_Soter
5 months, 1 week agoyottabyte
7 months, 4 weeks agonuel_12
8 months agoElDirec
8 months, 3 weeks agoAlexJacobson
11 months, 3 weeks agoCyberbug2021
12 months agoViperhunter
12 months agoViperhunter
12 months agoacf4e9a
1 year, 1 month agoCyberbug2021
12 months agooluchecpoint
1 year, 2 months agoAgamennore
1 year, 2 months agoAomineDaiki
1 year, 3 months agoDavoA
1 year, 4 months agoddharia94
1 year, 5 months ago[Removed]
1 year, 4 months ago