![]() ![]() If appropriate encryption is not available to protect data in transit, mobile devices communicating sensitive or classified data will present a security risk.Ĭontrol: ISM-1085 Revision: 4 Updated: Dec-21 Applicability: All Essential Eight: N/A Mobile devices encrypt their internal storage and any removable media. Storage encryptionĮncrypting the internal storage, and any removable media, for mobile devices will prevent an adversary from gaining easy access to any sensitive or classified data stored on them if they are lost or stolen.Ĭontrol: ISM-0869 Revision: 5 Updated: Dec-21 Applicability: All Essential Eight: N/A Personnel accessing systems or data using an organisation-owned mobile device use an ASD-approved platform, a security configuration in accordance with ACSC guidance, and have enforced separation of work and personal data. This can be achieved by using an ASD-approved platform, with a security configuration in accordance with ACSC guidance, along with enforced separation of work and personal data.Ĭontrol: ISM-1482 Revision: 6 Updated: Sep-22 Applicability: O, P, S, TS Essential Eight: N/A If an organisation chooses to issue personnel with an organisation-owned mobile device to access their organisation’s systems or data, they should ensure that it does not present an unacceptable security risk. Privately-owned mobile devices do not access SECRET and TOP SECRET systems or data. ![]() Personnel accessing OFFICIAL and PROTECTED systems or data using a privately-owned mobile device use an ASD-approved platform, a security configuration in accordance with ACSC guidance, and have enforced separation of work and personal data.Ĭontrol: ISM-0694 Revision: 7 Updated: Dec-21 Applicability: S, TS Essential Eight: N/A Legal advice is sought prior to allowing privately-owned mobile devices to access systems or data.Ĭontrol: ISM-1400 Revision: 7 Updated: Sep-22 Applicability: O, P Essential Eight: N/A This can be achieved by encouraging the use of an ASD-approved platform, with a security configuration in accordance with Australian Cyber Security Centre (ACSC) guidance, along with enforced separation of work and personal data.Ĭontrol: ISM-1297 Revision: 4 Updated: Dec-21 Applicability: All Essential Eight: N/A If an organisation chooses to allow personnel to use a privately-owned mobile device to access their organisation’s systems or data, they should ensure that it does not present an unacceptable security risk. As such, an organisation should seek legal advice to ascertain whether this scenario affects compliance with relevant legislation, such as the Privacy Act 1988 and the Archives Act 1983, and also consider whether the increased liability risks are acceptable to the organisation. Privately-owned mobile devicesĪllowing privately-owned mobile devices to access an organisation’s systems or data can increase liability risk. Mobile devices do not process, store or communicate SECRET or TOP SECRET data until approved for use by ASD. In order to ensure interoperability and maintain trust, all mobile devices that process, store or communicate SECRET or TOP SECRET data must be approved for use by the Australian Signals Directorate (ASD).Ĭontrol: ISM-0687 Revision: 9 Updated: Sep-22 Applicability: S, TS Essential Eight: N/A Since mobile devices routinely leave the office environment, and the protection it affords, it is important that a mobile device management policy is developed, implemented and maintained to ensure that they are sufficiently hardened.Ĭontrol: ISM-1533 Revision: 3 Updated: Dec-22 Applicability: All Essential Eight: N/AĪ mobile device management policy is developed, implemented and maintained.Ĭontrol: ISM-1195 Revision: 1 Updated: Sep-18 Applicability: All Essential Eight: N/AĪ Mobile Device Management solution is used to ensure mobile device management policy is applied to all mobile devices. Further guidance for laptops is available in the Guidelines for System Hardening and the Guidelines for System Management. These guidelines describe the use and protection of mobile devices, such as smartphones, tablets and laptops. The pick-up/drop-off location for the off-site rental car shuttles is located to the west of the Parking Garage.Mobile device management Types of mobile devices Budget 80 Open 24 hours Dollar 80 Open 7 a.m. ![]() On-Airport Rental Car Agencies Alamo 84 Open 7 a.m. Rental car counters are located in the Gateway Center, which is adjacent to the parking garage and accessible from the terminal by using the two bridges in the baggage claim area. Salt Lake City International Airport offers a variety of rental car providers and convenient access to rental car services. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |