User Device Management
Understand the CSC’s cloud network constructs and security boundaries.
Ask for workflow diagrams between user device and the network construct.
Review a copy of the mobile device management policy (MDM). Does the MDM allow for employees to bring their own device (BYOD)? If so:
What are the policies and requirements?
Do you have a management profiles on user mobile devices?
How are user devices managed?
How are they handling operating system updates?
Is there a cloud access security broker (CASB) in place? If so:
Who is managing the policies and threat analytics? Does the CSP offer this as a service or is it a third- party?
Understand the hand-off between CSP and the CSC. What is in the contract agreement? CSP SLAs?
Last updated