MDM-10: Separate Mobile Device Profiles
Mechanisms exist to enforce a separate device workspace on applicable mobile devices to separate work-related and personal-related applications and data.
Control Question: Does the organization enforce a separate device workspace on applicable mobile devices to separate work-related and personal-related applications and data?
General (2)
| Framework | Mapping Values |
|---|---|
| CIS CSC 8.1 | 4.12 |
| CIS CSC 8.1 IG3 | 4.12 |
Capability Maturity Model
Level 0 — Not Performed
There is no evidence of a capability to enforce a separate device workspace on applicable mobile devices to separate work-related and personal-related applications and data.
Level 1 — Performed Informally
C|P-CMM1 is N/A, since a structured process is required to enforce a separate device workspace on applicable mobile devices to separate work-related and personal-related applications and data.
Level 2 — Planned & Tracked
C|P-CMM2 is N/A, since a well-defined process is required to enforce a separate device workspace on applicable mobile devices to separate work-related and personal-related applications and data.
Level 3 — Well Defined
Mobile Device Management (MDM) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
- An Identity & Access Management (IAM) function, or similar function, performs the implementation of access controls for mobile devices that restricts the connectivity of mobile devices from communicating with systems, applications and services.
- Organization-owned mobile devices are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information stored on the device, and conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data.
- MDM software is used to restrict the data that is stored/processed/transmitted on organization-owned and/ or applicable Bring Your Own Device (BYOD) (e.g., personal devices) across the entire organization.
- MDM enforces a separate device workspace on applicable mobile devices to separate work-related and personal-related applications and data.
- Technologies are configured to use cryptographic mechanisms to protect the confidentiality and integrity of information on mobile devices through full-device or container encryption.
Level 4 — Quantitatively Controlled
See C|P-CMM3. There are no defined C|P-CMM4 criteria, since it is reasonable to assume a quantitatively-controlled process is not necessary to enforce a separate device workspace on applicable mobile devices to separate work-related and personal-related applications and data.
Level 5 — Continuously Improving
See C|P-CMM4. There are no defined C|P-CMM5 criteria, since it is reasonable to assume a continuously-improving process is not necessary to enforce a separate device workspace on applicable mobile devices to separate work-related and personal-related applications and data.
Assessment Objectives
- MDM-10_A01 a separate device workspace is enforced on applicable mobile devices to separate work-related and personal-related applications and data.