BYOD Guide Created using iThoughts [...] [...]. BYOD Guide.

Post on 14-Dec-2015

232 views 1 download

Tags:

transcript

BYOD Guide

Created using iThoughts[...]

BYOD Guide

Introduction

• Who is this for?• Implications of BYOD• Implications of no BYOD• What is your policy?– Authentication– End Point Security– Access Control

Discovery

• Type/Class of Device– Class of Device• IT Managed• User Managed

– Type of Device• Laptop• Tablet• Smart Phone• Other

Discovery

• Type/Class of User– Known• Super User• Departmental User• Contractor

– Unknown• Contractor• Guest

Discovery

• Location– Office– Home– Public Wi-Fi Hote Spot– Hotel– Non-corporate Office

• Time of Day/Day of Week

Discovery

• Bandwidth Allocation– Per Device– Per User– Per Application

• Application/Service

Telephony Support

• Type/Class of Device• Features– Single Number– Presence– Mobility

Define Access Policies

• Security Policy Alignment• Network Services– Known User• HR Involvement

– New Employee Policy– Leavers Policy

• IT Managed Device– Laptop– Tablet

Define Access Policies

• User Managed Device– Corporate Location– Home– Other Location

– Unknown User• User Managed Device

– Corporate Location

• Telephony– Corporate Handset

Define Access Policies

• Staff• Contractor

– Personal Handset• Staff• Contractor

– HR Involvement• New Employee Policy• Leavers Policy

Design, Specification & Deployment

• Goals - what do you want to achieve?• Design & Architecture• Resilience/Redundancy• Integration• Define User Groups• Profile - what can we find out about the

device?• Posture - what are we checking?

Design, Specification & Deployment

• Enforcement - what action do we take?• Implementation - how do we install?• Setting Expectations• Determine Timescales• Scheduling• User Group Regression Plans• Proof of Concept

Design, Specification & Deployment

– Users– User Devices– Objectives– Pre-test– Success Criteria– Stakeholders– Sign Off

Management

• On Boarding– IT Staff Impact– Automation

• Monitoring– Diagnostics– Logging– Compliance and Auditing

Management

– Reporting– Alarms– Incident Response– Revocation

• Security Policy Aligment– Users– IT Managed Device

Management

– User Managed Device– HR Implications– Change Management– Security Audit– Review Process

Next Steps

• http://www.astro.co.uk/byod/byod-resource• Call Marie on +44 (0)1322 610 178• Email Marie - mcronin@astro.co.uk