ISO 27001 Compliance through Applivery MDM

/
/
/
ISO 27001 Compliance through Applivery MDM
ISO 27001 is a compliance standard that outlines the requirements for an Information Security Management System (ISMS). These systems protect the security, availability, and confidentiality of an organization’s information assets through technical and organizational policies and procedures. Complying with ISO 27001 means that an organization has systems in place and follows best practices to manage the risks associated with its data. Recently, at Applivery, we obtained our own ISO 27001 certification using our MDM solution.

How MDM facilitates security compliance

The management clauses of the ISO 27001 standard broadly outline the controls an organization must implement to demonstrate that it is taking appropriate steps to mitigate information security risks. These controls range from access control and physical security to cryptography and incident management, and are categorized into four general areas: technical, organizational, physical, and personnel. Many of these controls can be directly addressed by an MDM solution like Applivery.
Onboarding process with Applivery

Technical controls

End-user devices

Information stored, processed, or accessible to users on end-user devices must be protected. MDM can help by ensuring that company-provided devices have encrypted hard drives.

Malware protection

It’s essential to ensure that information and other assets are protected against malware, and this protection should be supported by proper user training on best practices. MDM can assist by deploying anti-malware software.

Technical vulnerabilities

Organizations need to stay aware of technical vulnerabilities that could affect their information systems, with processes to assess their exposure and tools to defend against threats. MDM should be capable of patching these vulnerabilities on devices, whether in the operating system or other software.

Configuration management

MDM is essential for implementing and monitoring configurations, including security settings, for hardware, software, and services to ensure they comply with security requirements. Additionally, there must be a mechanism to remediate any unauthorized changes to configurations.

Software installation

Procedures and measures should be in place to install software securely, allowing installation from official stores and other sources in a manner that ensures integrity and prevents the exploitation of vulnerabilities.
BYOD bring your own device, applivery MDM

Organizational controls

Asset inventory

The organization must identify its information and associated assets to preserve their security and assign appropriate ownership. MDM can help by generating and exporting IT asset inventory reports.

Asset return

The organization should have a system to ensure that employees (and others) who possess information assets, such as computers or other devices, return those assets when their employment, contract, or agreement changes or ends. Applivery also allows administrators to lock these devices in such events.

Authentication information

As an IT administrator, you must ensure that users handle passwords and other authentication elements correctly. One way to achieve this is by deploying a password manager on devices through MDM. Another is to ensure users follow good password policies when accessing their devices; again, these policies can be enforced via MDM.

Cryptography

You need the infrastructure to use cryptography effectively, protecting the confidentiality and authenticity of business information, including key management. A good MDM solution allows you to enable and configure options for FileVault and BitLocker, including scanning a recovery key.

Physical Controls

Storage media

Storage media must be managed throughout their lifecycle, from acquisition and use to disposal. The organization should control the disclosure, modification, deletion, and destruction of information on such media. Some MDM solutions, including Applivery, allow for defining rules that permit or block access to removable storage.

Personnel Controls

Remote work

It’s essential to have systems in place that protect the organization’s information even when employees work remotely. MDM can facilitate this by configuring hard drive encryption on devices used by remote employees, ensuring data is protected outside the company’s premises.
Applivery MDM with kiosk mode configuration for Android, Apple and Windows

These are the key ISO 27001 controls that MDM can help implement. There may be others, depending on how you’ve implemented MDM, how your organization operates, and the specific capabilities of your MDM solution.

With the rise of cybercrime and the constant emergence of new threats, these controls are more important than ever. Paying attention to ISO 27001 requirements can help you become more aware of risks and proactively identify and address any weaknesses in your organization. An MDM solution like Applivery could be a key tool in achieving this.

Applivery is the device management and security platform for Apple devices that empowers safe and productive work on a global scale. With Applivery, devices are under company supervision, with all the appropriate applications, configurations, and security systems in place.

Share this post

Try Applivery free for 14 days, no credit card required

Join 8.000 companies who already have a head start.

Stay Connected

Explore all posts

— talk to an expert —

Talk to an expert