User Device Management

  • Understand the CSC’s cloud network constructs and security boundaries.

  • Ask for workflow diagrams between user device and the network construct.

  • Review a copy of the mobile device management policy (MDM). Does the MDM allow for employees to bring their own device (BYOD)? If so:

    • What are the policies and requirements?

    • Do you have a management profiles on user mobile devices?

    • How are user devices managed?

    • How are they handling operating system updates?

  • Is there a cloud access security broker (CASB) in place? If so:

    • Who is managing the policies and threat analytics? Does the CSP offer this as a service or is it a third- party?

  • Understand the hand-off between CSP and the CSC. What is in the contract agreement? CSP SLAs?

Last updated