As promised, the Cloud Security Alliance (CSA) has released a report outlining 17 specific elements that need to go into the security lifecycle of corporate mobile device policies.\tThe whitepaper is one of six parts to the upcoming, "Security Guidance for Critical Areas of Mobile Computing" I told you about yesterday. It'll be released at the upcoming annual CSA Congress Nov. 7-8 in Orlando.\t\u201cAs mobile devices have become mainstays in the enterprise, an understanding of the full technology, process, and people implications of MDM will be absolutely required to ensure that the introduction of mobile devices will not compromise security,\u201d says J.R. Santos, Global Research Director of the CSA. \u201cWhile most companies already have security policies in place, those policies need to be reviewed and possibly updated to account for the many components of mobile technology that we have identified in this report.\u201d\tAt a glance, the 17 elements are:\t1.) Policy\t2.) Risk Management\t3.) Device Diversity\/Degree of Freedom\t4.) Configuration Management\t5.) Software Distribution\t6.) Enterprise AppStore\t7.) Content Library\t8.) Procurement\t9.) Provisioning\t10.) Device Policy Compliance and Enforcement\t11.) Enterprise Activation\/Deactivation\t12.) Enterprise Asset Disposition\t13.) Process Automation\t14.) User Activity Logging\/Workplace Monitoring\t15.) Security Settings\t16.) Selective Wipe\/Remote Wipe\/Lock\t17.) Identity Management\/Authentication\/Encryption\tYou can download the full report here.