404 Tech Support

Resources for a Bring Your Own Device policy

Bring Your Own Device has been a common phrase for a while now but its implementation often has room for improvement. The BYOD concept has even made its way into comics. Fortunately with time passing, more resources have become available. The benefit with not being on the cutting edge means others have gone before you. Here are a few resources with recommendations for a solid BYOD policy.

White House

The White House has one of the most comprehensive resources for supporting Bring Your Own Device. The toolkit is aimed to assist federal agencies with the implementation of BYOD programs. The page includes case studies and example policies as well as a list of key considerations that should be figured out well before a policy is implemented.

Dell

Dell offers a BYOD Best Practices Guide (.pdf). It does a good job of thinking through the BYOD topic beyond just the technical considerations. There are plenty of other concerns with BYOD from HR and accounting perspectives.

NIST

The National Institute of Standards and Technology hosts a presentation from the Federal Information Systems Security Educators’ Association titled To BYOD or NOT to BYOD (.pdf). The presentation came from a panel of experts on the topic and what questions should be considered when it comes to implementing a BYOD policy. The presentation also mentions an Advanced Mobility website which facilitates collaboration between those implementing BYOD.

IASE

The Information Assurance Support Environment for the Department of Defense was recommended as a resource in a previous 404TS article. They have a recent article (.pdf) on Commercial Mobile Devices with section 6.3.2 on Bring Your Own Device. They come to the following conclusion:

Despite the benefits, existing DoD policies, operational constructs, and security vulnerabilities currently prevent the adoption of devices that are unapproved and procured outside of official government acquisition.

They are looking to utilize VDI (virtual desktop infrastructure) with TPM (Trusted Platform Module) to possibly offer a secure, hardened device access in the future.

If you know of any other resources on BYOD that you would recommend, please share them in the comments.