Source: https://www.giac.org/paper/gccc/781/hardening-byod-implementing-critical-security-control-3-bring-device-byod-architecture/141044