The report identifies 17 must-have elements in the lifecycle of a mobile device security program. As promised, the Cloud Security Alliance (CSA) has released a report outlining 17 specific elements that need to go into the security lifecycle of corporate mobile device policies. The whitepaper is one of six parts to the upcoming, “Security Guidance for Critical Areas of Mobile Computing” I told you about yesterday. It’ll be released at the upcoming annual CSA Congress Nov. 7-8 in Orlando. “As mobile devices have become mainstays in the enterprise, an understanding of the full technology, process, and people implications of MDM will be absolutely required to ensure that the introduction of mobile devices will not compromise security,” says J.R. Santos, Global Research Director of the CSA. “While most companies already have security policies in place, those policies need to be reviewed and possibly updated to account for the many components of mobile technology that we have identified in this report.” At a glance, the 17 elements are: 1.) Policy 2.) Risk Management 3.) Device Diversity/Degree of Freedom 4.) Configuration Management 5.) Software Distribution 6.) Enterprise AppStore 7.) Content Library 8.) Procurement 9.) Provisioning 10.) Device Policy Compliance and Enforcement 11.) Enterprise Activation/Deactivation 12.) Enterprise Asset Disposition 13.) Process Automation 14.) User Activity Logging/Workplace Monitoring 15.) Security Settings 16.) Selective Wipe/Remote Wipe/Lock 17.) Identity Management/Authentication/Encryption You can download the full report here. Related content news Gwinnett Medical Center investigating possible data breach After being contacted by Salted Hash, Gwinnett Medical Center has confirmed they're investigating a security incident By Steve Ragan Oct 02, 2018 6 mins Regulation Data Breach Hacking news Facebook: 30 million accounts impacted by security flaw (updated) In a blog post, Facebook’s VP of product management Guy Rosen said the attackers exploited a flaw in the website's 'View As' function By Steve Ragan Sep 28, 2018 4 mins Data Breach Security news Scammers pose as CNN's Wolf Blitzer, target security professionals Did they really think this would work? By Steve Ragan Sep 04, 2018 2 mins Phishing Social Engineering Security news Congress pushes MITRE to fix CVE program, suggests regular reviews and stable funding After a year of investigation into the Common Vulnerabilities and Exposures (CVE) program, the Energy and Commerce Committee has some suggestions as to how it can be improved By Steve Ragan Aug 27, 2018 3 mins Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe