Question: Bring Your Own Device ( BYOD ) Security Policy Free Use Disclaimer: This policy was created by or for the SANS Institute for the internet
Bring Your Own Device BYOD Security Policy
Free Use Disclaimer: This policy was created by or for the SANS Institute for the internet community. All or parts of this policy can be freely used for your organization. There is no prior approval required.
Last Update Status: Updated August
Overview
Provide some information on how widely used tablets, smartphones, and laptops are in modern enterprises. Try to identify threats that are associated to these devices.
Purpose
The main goal of any IT security policy is to protect confidentiality, integrity, and availability CIA of data. With that said, one reason to have the BYOD security policy is to identify devices that introduce unnecessary vulnerabilities to the organization's computing resources. Address how timely discovery of such vulnerabilities will reduce the attack vector on an organization's computing resources.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
