Security controls to protect agency data and systems;. 7. Compliance review and;. 8. Exception management. iii. The head of agency shall by accountable for BYOD
bring your own device (BYOD); host security; information security; of these checklists are posted on the NIST Security Checklists for IT Products site ...
https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-46r2.pdf
Mar 14 2016 Your Own Device (BYOD) Security
Microsoft office 365 (Login with NT Schools accounts.) • Internet Security (must be up to date with all critical patches and OS security updates.) Battery Life.
personally-owned (bring your own device BYOD) mobile devices. Keywords cell phone security; information security; mobile device security; mobility;
23. Is PIN or other biometric security or multifactor authentication mechanism used by user on End User Device? 24. Is there a "Bring your own device" (BYOD)
Security requirements are different based on the organization's technology model: personally-owned via a bring your own device (BYOD) initiative or
has a BYOD audit program that helps identify specific security controls in management and IT. (ISACA 2016). However
Facebook.com/CISA. @cisagov. CISA