Use Case:
Compromised Enterprise Mobility Management Device Initiates Security

Enterprise Mobility Management has integration with many IDSA applications so that it can share information when a user’s device has been compromised. These applications can then act on this information by disabling the end user’s access until the situation has been resolved.

Scenario

Enterprise Mobility Management (EMM) provides device compromised status to appropriate IDSA applications for disabling access of effected end users.

Actions

– Click for larger image –

Success Criteria

  1. Access is disabled in end user’s device is compromised.
  2. Access is re-enabled once approved by the manager.

IDSA Security Controls

Risk-based Governance

Access enforcement based on risk posture derived from at least one risk engine. (Cloud Access Security Broker, Fraud & Risk, UEBA, SIEM).

Risk-based EMM Management

Enterprise Mobility Management (EMM) device management based on risk posture derived from at least one risk engine (Cloud Access Security Broker, Fraud & Risk, UEBA, SIEM).