Use Case - Compromised Enterprise Mobility Management Device Initiates Security
Recommended Implementation Details
Scenario Enterprise Mobility Management (EMM) provides device compromised status to appropriate IDSA applications for disabling access of effected end users
Description Enterprise Mobility Management has integration with many IDSA applications so that it can share information when a user’s device has been compromised. These applications can then act on this information by disabling the end user’s access until the situation has been resolved.
IDSA Security Controls
Success Criteria
  1. Access is disabled in end user’s device is compromised
  2. Access is re-enabled once approved by the manager