Endpoint & Workload Protection · EP-Q07

Question: Are mobile devices managed through enterprise controls (MDM/MAM) with encryption and remote-wipe capability?

Why This Matters

Lost or stolen mobile devices can expose sensitive data. MDM and encryption ensure corporate data remains protected and recoverable.

Maturity

0 — Unaware
No mobile-device policy; unmanaged BYOD.
1 — Ad Hoc
Password enforcement only; no central management.
2 — Defined
MDM solution identified; device registration mandatory.
3 — Managed
Encryption and remote-wipe enforced; compliance dashboards used.
4 — Integrated
Conditional access and app-level controls implemented.
5 — Optimized
Unified Endpoint Management across devices, adaptive risk policies.

How to Level Up

From → To Actions
0 → 1 Publish basic mobile policy; require screen lock and PIN.
1 → 2 Deploy free MDM or vendor-provided suite; mandate enrollment.
2 → 3 Enable encryption, remote wipe, and compliance alerts.
3 → 4 Integrate with identity provider for conditional access.
4 → 5 Adopt unified policies for all device types (Windows, macOS, iOS, Android).

Enablers

Evidence

KPIs

Low-Cost / Open-Source Options (MSME)

Purpose Tool Notes
MDM management Intune Free / Kandji Starter / Flyve MDM Small-tenant friendly.
Encryption BitLocker / FileVault / Android default Built-in capabilities.
Inventory Snipe-IT + MDM sync Single pane for assets.

Common Pitfalls

Compliance Mapping

Standard Clauses / Notes
ISO/IEC 27001:2022 A.8.10 (Use of Mobile Devices)
CERT-In 2022 Section 10 (Mobile Security)
DPDP Act 2023 Sec 9 (Safeguards for Personal Data)
NIST CSF 2.0 PR.AC-05 / PR.PT-04
NIRMATA Mapping EP-Q07 links to mobility security controls.