Post on 14-Dec-2015
transcript
BYOD Guide
Introduction
• Who is this for?• Implications of BYOD• Implications of no BYOD• What is your policy?– Authentication– End Point Security– Access Control
Discovery
• Type/Class of Device– Class of Device• IT Managed• User Managed
– Type of Device• Laptop• Tablet• Smart Phone• Other
Discovery
• Type/Class of User– Known• Super User• Departmental User• Contractor
– Unknown• Contractor• Guest
Discovery
• Location– Office– Home– Public Wi-Fi Hote Spot– Hotel– Non-corporate Office
• Time of Day/Day of Week
Discovery
• Bandwidth Allocation– Per Device– Per User– Per Application
• Application/Service
Telephony Support
• Type/Class of Device• Features– Single Number– Presence– Mobility
Define Access Policies
• Security Policy Alignment• Network Services– Known User• HR Involvement
– New Employee Policy– Leavers Policy
• IT Managed Device– Laptop– Tablet
Define Access Policies
• User Managed Device– Corporate Location– Home– Other Location
– Unknown User• User Managed Device
– Corporate Location
• Telephony– Corporate Handset
Define Access Policies
• Staff• Contractor
– Personal Handset• Staff• Contractor
– HR Involvement• New Employee Policy• Leavers Policy
Design, Specification & Deployment
• Goals - what do you want to achieve?• Design & Architecture• Resilience/Redundancy• Integration• Define User Groups• Profile - what can we find out about the
device?• Posture - what are we checking?
Design, Specification & Deployment
• Enforcement - what action do we take?• Implementation - how do we install?• Setting Expectations• Determine Timescales• Scheduling• User Group Regression Plans• Proof of Concept
Design, Specification & Deployment
– Users– User Devices– Objectives– Pre-test– Success Criteria– Stakeholders– Sign Off
Management
• On Boarding– IT Staff Impact– Automation
• Monitoring– Diagnostics– Logging– Compliance and Auditing
Management
– Reporting– Alarms– Incident Response– Revocation
• Security Policy Aligment– Users– IT Managed Device
Management
– User Managed Device– HR Implications– Change Management– Security Audit– Review Process
Next Steps
• http://www.astro.co.uk/byod/byod-resource• Call Marie on +44 (0)1322 610 178• Email Marie - mcronin@astro.co.uk