ISO 27001 is a compliance standard that outlines the requirements for an Information Security Management System (ISMS). These systems protect the security, availability, and confidentiality of an organization’s information assets through technical and organizational policies and procedures. Complying with ISO 27001 means that an organization has systems in place and follows best practices to manage the risks associated with its data.
Recently, at Applivery, we obtained our own ISO 27001 certification using our MDM solution.
The management clauses of the ISO 27001 standard broadly outline the controls an organization must implement to demonstrate that it is taking appropriate steps to mitigate information security risks. These controls range from access control and physical security to cryptography and incident management, and are categorized into four general areas: technical, organizational, physical, and personnel. Many of these controls can be directly addressed by an MDM solution like Applivery.
Information stored, processed, or accessible to users on end-user devices must be protected. MDM can help by ensuring that company-provided devices have encrypted hard drives.
It’s essential to ensure that information and other assets are protected against malware, and this protection should be supported by proper user training on best practices. MDM can assist by deploying anti-malware software.
Organizations need to stay aware of technical vulnerabilities that could affect their information systems, with processes to assess their exposure and tools to defend against threats. MDM should be capable of patching these vulnerabilities on devices, whether in the operating system or other software.
MDM is essential for implementing and monitoring configurations, including security settings, for hardware, software, and services to ensure they comply with security requirements. Additionally, there must be a mechanism to remediate any unauthorized changes to configurations.
Procedures and measures should be in place to install software securely, allowing installation from official stores and other sources in a manner that ensures integrity and prevents the exploitation of vulnerabilities.
The organization must identify its information and associated assets to preserve their security and assign appropriate ownership. MDM can help by generating and exporting IT asset inventory reports.
The organization should have a system to ensure that employees (and others) who possess information assets, such as computers or other devices, return those assets when their employment, contract, or agreement changes or ends. Applivery also allows administrators to lock these devices in such events.
As an IT administrator, you must ensure that users handle passwords and other authentication elements correctly. One way to achieve this is by deploying a password manager on devices through MDM. Another is to ensure users follow good password policies when accessing their devices; again, these policies can be enforced via MDM.
You need the infrastructure to use cryptography effectively, protecting the confidentiality and authenticity of business information, including key management. A good MDM solution allows you to enable and configure options for FileVault and BitLocker, including scanning a recovery key.
Storage media must be managed throughout their lifecycle, from acquisition and use to disposal. The organization should control the disclosure, modification, deletion, and destruction of information on such media. Some MDM solutions, including Applivery, allow for defining rules that permit or block access to removable storage.
It’s essential to have systems in place that protect the organization’s information even when employees work remotely. MDM can facilitate this by configuring hard drive encryption on devices used by remote employees, ensuring data is protected outside the company’s premises.