<section title="22.4. Non-Agency Owned Devices and Bring Your Own Device (BYOD)"><subsection title="Objective"><paragraph
    title="22.4.1."


><![CDATA[<p>Where an Agency&nbsp;permits personnel to supply their own mobile devices (such as smartphones, tablets and laptops), Official Information and agency information systems are protected to a level equivalent to an agency provided and managed office environment.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="22.4.2."


><![CDATA[<p>This section provides information on the use and security of <strong>non-agency owned or provided</strong> mobile devices when used for official business. This is commonly known as Bring Your Own Device (BYOD). The use of agency owned devices is described earlier in <a href="http://nzism.gcsb.govt.nz/ism-document#Section-17004">Section 21.1 – Agency Owned Mobile Devices</a>.</p>]]></paragraph>
<paragraph
    title="22.4.3."


><![CDATA[<p>In the context of this section, a BYOD Network is any agency owned or provided network dedicated to BYOD. &nbsp;A BYOD Network is usually within an agency’s premises but does NOT include networks and related services provided by commercial telecommunication or other technology providers.</p>]]></paragraph>
<paragraph
    title="22.4.4."


><![CDATA[<p>BYOD will introduce a wide range of risks, including information and privacy risks, to an organisation, in addition to the existing ICT risks and threats. &nbsp;Agencies will need to carefully examine and consider the security, privacy, governance, assurance and compliance risks and implications of BYOD.</p>]]></paragraph>
<paragraph
    title="22.4.5."


><![CDATA[<p>Mobile devices are a “soft” target for malware and cybercrime providing a further attack channel or vector for organisational ICT infrastructures and networks. Risks fall principally into the following categories:</p>
<ul>
<li>Data exfiltration and theft;</li>
<li>Data tampering;</li>
<li>Data loss;</li>
<li>Malware;</li>
<li>System outages and Denial of Service; and</li>
<li>Increased incident management and recovery costs.</li>
</ul>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="22.4.6."


><![CDATA[<table class="table-main">
<tbody>
<tr>
<td><strong>Reference&nbsp;</strong></td>
<td><strong>Title</strong></td>
<td><strong>Publisher</strong></td>
<td style="width: 33%;"><strong>Source</strong></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Risk Management of Enterprise Mobility including Bring Your Own Device</strong></p>
</td>
<td style="text-align: center;">
<p>ASD</p>
</td>
<td style="width: 33%;">
<p><a title="Risk Management of Enterprise Mobility" rel="noopener noreferrer" href="https://www.cyber.gov.au/acsc/view-all-content/publications/risk-management-enterprise-mobility-including-bring-your-own-device" target="_blank">https://www.cyber.gov.au/acsc/view-all-content/publications/risk-management-enterprise-mobility-including-bring-your-own-device</a>&nbsp;</p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong><strong>BYOD Guidance: Device Security Considerations</strong></strong></p>
</td>
<td style="text-align: center;">
<p><span>GOV.UK</span></p>
</td>
<td style="width: 33%;">
<p><a rel="noopener noreferrer" href="https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/360960/BYOD_Guidance_-_Device_Security_Considerations.pdf" target="_blank">https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/360960/BYOD_Guidance_-_Device_Security_Considerations.pdf [PDF, 235 KB]</a><a rel="noopener noreferrer" href="https://www.ncsc.gov.uk/eud-guidance" target="_blank"></a></p>
</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>End User Devices Security and Configuration Guidance</strong></p>
</td>
<td style="text-align: center;">
<p>NCSC, UK</p>
</td>
<td style="width: 33%;">
<p><a title="BYOD Security Guidance" rel="noopener noreferrer" href="https://www.ncsc.gov.uk/collection/device-security-guidance/bring-your-own-device" target="_blank">https://www.ncsc.gov.uk/collection/device-security-guidance/bring-your-own-device</a></p>
</td>
</tr>
<tr>
<td>
<p><strong>NIST Special Publication 800-121, Revision 2, May 2017</strong></p>
</td>
<td>
<p><strong>Guide to Bluetooth Security</strong></p>
</td>
<td style="text-align: center;">
<p>NIST</p>
</td>
<td style="width: 33%;">
<p><a title="NIST SP 800-121" rel="noopener noreferrer" href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-121r2.pdf" target="_blank">https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-121r2.pdf [PDF, 2.1 MB]</a></p>
</td>
</tr>
<tr>
<td>
<p><strong>NIST Special Publication 800-46,&nbsp;<strong>Revision 2, July 2016</strong></strong></p>
</td>
<td>
<p><strong>Guide to Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) Security</strong></p>
</td>
<td style="text-align: center;">
<p>NIST</p>
</td>
<td style="width: 33%;">
<p><a title="NIST SP 800-46" rel="noopener noreferrer" href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-46r2.pdf" target="_blank">https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-46r2.pdf [PDF, 570 KB]</a></p>
</td>
</tr>
<tr>
<td>
<p><strong>NIST Special Publication 800-114,&nbsp;<strong>Revision 1, July 2016</strong></strong></p>
</td>
<td>
<p><strong>User’s Guide to Telework and Bring Your Own Device (BYOD) Security</strong></p>
</td>
<td style="text-align: center;">NIST</td>
<td style="width: 33%;">
<p><a title="NIST SP 800-114" rel="noopener noreferrer" href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-114r1.pdf" target="_blank">https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-114r1.pdf [PDF, 435 KB]</a></p>
</td>
</tr>
</tbody>
</table><p>&nbsp;</p>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Risk Assessment"><paragraph
    title="22.4.7.R.01."

    tags="Governance,Mobile Devices,BYOD,Risk Assessment"


><![CDATA[<p>Commonly termed “Bring Your Own Device” (BYOD), personal use of mobile computing in an organisational environment is widespread and personnel have become accustomed to the use of a variety of personal mobile devices. &nbsp;BYOD can have many advantages for an agency and for personnel. &nbsp;At the same time, BYOD will introduce a range of new information security risks and threats and may exacerbate existing risks.</p>]]></paragraph>
<paragraph
    title="22.4.7.C.01."

    tags="Governance,Mobile Devices,BYOD,Risk Assessment"


    classification="All Classifications"
    compliance="Must"
    cid="4597"
><![CDATA[<p>Agencies MUST undertake a risk assessment and implement appropriate controls BEFORE implementing a BYOD Policy and permitting the use of BYOD.</p>]]></paragraph>
<paragraph
    title="22.4.7.C.02."

    tags="Governance,Mobile Devices,BYOD,Risk Assessment"


    classification="All Classifications"
    compliance="Must"
    cid="4598"
><![CDATA[<p>Agencies MUST take an integrated approach to BYOD security, covering policy, training, support, systems architecture, security, systems management, change management, incident detection &amp; management and business continuity.</p>]]></paragraph>
</block>
<block title="Applicability and Usage"><paragraph
    title="22.4.8.R.01."

    tags="Governance,Mobile Devices,BYOD"


><![CDATA[<p>BYOD introduces number of additional risks and attack vectors to agency systems. &nbsp;Not all BYOD risks can be fully mitigated with technologies available today. &nbsp;It is therefore important that, where feasible, all the controls specified in this section are implemented.</p>]]></paragraph>
<paragraph
    title="22.4.8.C.01."

    tags="Governance,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4623"
><![CDATA[<p>BYOD MUST <strong>only</strong> be permitted for agency information systems up to and including RESTRICTED.</p>]]></paragraph>
<paragraph
    title="22.4.8.C.02."

    tags="Governance,Mobile Devices,BYOD"


    classification="Confidential, Top Secret, Secret"
    compliance="Must Not"
    cid="4624"
><![CDATA[<p>BYOD MUST NOT be used for CONFIDENTIAL, SECRET or TOP SECRET systems.</p>]]></paragraph>
</block>
<block title="Technical Controls"><paragraph
    title="22.4.9.R.01."

    tags="Technical,Mobile Devices,BYOD"


><![CDATA[<p>“Jail-Breaking” and “rooting” are terms applied to devices where operating systems controls have been by-passed to allow installation of alternate operating systems or software applications that are not otherwise permitted. &nbsp;This is a risky practice and can create opportunities for device compromise. &nbsp;Users may wish to alter settings to allow the download of personal apps. &nbsp;This can result in security setting violations.</p>]]></paragraph>
<paragraph
    title="22.4.9.C.01."

    tags="Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must Not"
    cid="4627"
><![CDATA[<p>Devices that have been “jail-broken”, “rooted” or have settings violations MUST NOT be used for any agency business or be allowed to connect to any agency systems UNLESS this been specifically authorised.</p>]]></paragraph>
</block>
<block title="BYOD Policy"><paragraph
    title="22.4.10.R.01."

    tags="Governance,Mobile Devices,BYOD,Risk Assessment"


><![CDATA[<p>Technical controls fall into two categories: organisational systems and device controls. &nbsp;Protection for organisational systems will start with a risk assessment which guides the development of a secure architecture to support BYOD operations. &nbsp;Additional controls will need to be applied to individual devices. &nbsp;The privacy of user data should be considered. A user policy is essential.</p>]]></paragraph>
<paragraph
    title="22.4.10.C.01."

    tags="Governance,Mobile Devices,BYOD,Risk Assessment"


    classification="All Classifications"
    compliance="Must"
    cid="4630"
><![CDATA[<p>Agencies may identify additional policy provisions and controls that are required, based on their assessment of risk. &nbsp;Agencies MUST implement the additional controls and protocols before implementing BYOD.</p>]]></paragraph>
<paragraph
    title="22.4.10.C.02."

    tags="Governance,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4631"
><![CDATA[<p>Agencies MUST implement a BYOD acceptable use policy, agreed and signed by each person using a BYOD device.</p>]]></paragraph>
<paragraph
    title="22.4.10.C.03."

    tags="Governance,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4632"
><![CDATA[<p>The agency’s policy MUST clearly establish eligibility of personnel for participation in the agency BYOD scheme.</p>]]></paragraph>
<paragraph
    title="22.4.10.C.04."

    tags="Governance,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4633"
><![CDATA[<p>Personnel MUST have written authorisation (usually managerial approval) before a connection is enabled (on-boarding).</p>]]></paragraph>
<paragraph
    title="22.4.10.C.05."

    tags="Governance,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4634"
><![CDATA[<p>Written authorisation MUST include the nature and extent of agency access approved, considering:</p>
<ul>
<li>time, day of the week;</li>
<li>location; and</li>
<li>local or roaming access.</li>
</ul>]]></paragraph>
<paragraph
    title="22.4.10.C.06."

    tags="Governance,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4635"
><![CDATA[<p>Procedures MUST be established for removal of agency installed software and any agency data when the user no longer has a need to use BYOD, is redeployed or ceases employment (off-boarding).</p>]]></paragraph>
<paragraph
    title="22.4.10.C.07."

    tags="Governance,Mobile Devices,BYOD,SOPs"


    classification="All Classifications"
    compliance="Must"
    cid="4637"
><![CDATA[<p>Standard Operating Procedures for the agency’s BYOD network MUST be established.</p>]]></paragraph>
<paragraph
    title="22.4.10.C.08."

    tags="Governance,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4638"
><![CDATA[<p>Provision MUST be made for contractors and other authorised non-employees. &nbsp;It is at the agency’s discretion whether this activity is permitted. &nbsp;The risk assessment MUST reflect this factor.</p>]]></paragraph>
<paragraph
    title="22.4.10.C.09."

    tags="Governance,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4639"
><![CDATA[<p>Ownership of data on BYOD devices MUST be clearly articulated and agreed.</p>]]></paragraph>
<paragraph
    title="22.4.10.C.10."

    tags="Governance,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4643"
><![CDATA[<p>Agency policies MUST clearly articulate the separation between corporate support and where individuals are responsible for the maintenance and support of their own devices.</p>]]></paragraph>
<paragraph
    title="22.4.10.C.11."

    tags="Governance,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4644"
><![CDATA[<p>Agency policies MUST clearly articulate the acceptable use of any GPS or other tracking capability.</p>]]></paragraph>
<paragraph
    title="22.4.10.C.12."

    tags="Governance,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4645"
><![CDATA[<p>Individual responsibility for the cost of any BYOD device and its accessories MUST be agreed.</p>]]></paragraph>
<paragraph
    title="22.4.10.C.13."

    tags="Governance,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4646"
><![CDATA[<p>Individual responsibility for replacement in the event of loss or theft MUST be agreed.</p>]]></paragraph>
<paragraph
    title="22.4.10.C.14."

    tags="Governance,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4647"
><![CDATA[<p>Individuals MUST be responsible for the installation and maintenance of any mandated BYOD-based firewalls and anti-malware software and for implementing operating system updates and patches on their device.</p>]]></paragraph>
<paragraph
    title="22.4.10.C.15."

    tags="Governance,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4648"
><![CDATA[<p>The procedures for purchasing and installing business related applications on the mobile devices MUST be specified and agreed.</p>]]></paragraph>
<paragraph
    title="22.4.10.C.16."

    tags="Data Management"


    classification="All Classifications"
    compliance="Must"
    cid="4650"
><![CDATA[<p>The responsibility for payment of voice and data plans and roaming charges MUST be specified and agreed.</p>]]></paragraph>
</block>
<block title="BYOD Infrastructure and System Controls"><paragraph
    title="22.4.11.R.01."

    tags="Infrastructure,Technical,Mobile Devices,Risk Management,BYOD"


><![CDATA[<p>The use of BYOD presents increased risk and threat to agency systems. &nbsp;Changes to an agency’s security architecture are necessary in order to minimise and manage the increased risk and threat to agency systems, information and information privacy.</p>]]></paragraph>
<paragraph
    title="22.4.11.R.02."

    tags="Infrastructure,Technical,Mobile Devices,Risk Management,BYOD"


><![CDATA[<p>It is important that the principles of separation and segregation are applied to any system architecture or design to assist in the management of risk in BYOD systems.</p>]]></paragraph>
<paragraph
    title="22.4.11.R.03."

    tags="Infrastructure,Technical,Mobile Devices,BYOD"


><![CDATA[<p>BYOD devices will seek to establish multiple connections through Wi-Fi “hot spots”, Bluetooth connection and simultaneous internet and cellular connections. &nbsp;This behaviour creates multiple simultaneous “back channels” which can provide attack vectors for malicious activities and is considered to be high risk.</p>]]></paragraph>
<paragraph
    title="22.4.11.C.01."

    tags="Infrastructure,Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4655"
><![CDATA[<p>A security architectural review MUST be undertaken by the agency before allowing BYOD devices to connect to agency systems.</p>]]></paragraph>
<paragraph
    title="22.4.11.C.02."

    tags="Infrastructure,Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4656"
><![CDATA[<p>The BYOD network segment MUST be segregated from other elements of the agency’s network.</p>]]></paragraph>
<paragraph
    title="22.4.11.C.03."

    tags="Infrastructure,Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4657"
><![CDATA[<p>Agencies MUST architecturally separate guest and public facing networks from BYOD networks.</p>]]></paragraph>
<paragraph
    title="22.4.11.C.04."

    tags="Infrastructure,Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4658"
><![CDATA[<p>Network configuration policies and authentication mechanisms MUST allow access to agency resources ONLY through the BYOD network segment.</p>]]></paragraph>
<paragraph
    title="22.4.11.C.05."

    tags="Infrastructure,Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4659"
><![CDATA[<p>Access to internal resources and servers MUST be carefully managed and confined to only those services for which there is a defined and properly authorised business requirement.</p>]]></paragraph>
<paragraph
    title="22.4.11.C.06."

    tags="Infrastructure,Technical,WLANs,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4660"
><![CDATA[<p>Wireless access points used for access to agency networks MUST be implemented and secured in accordance with the directions in this manual (See <a href="http://nzism.gcsb.govt.nz/ism-document#Section-16241">Section 18.2 – Wireless Local Area Networks</a>).</p>]]></paragraph>
<paragraph
    title="22.4.11.C.07."

    tags="Bluetooth,Infrastructure,Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4661"
><![CDATA[<p>Bluetooth on BYOD devices MUST be disabled while within designated secure areas on agency premises.</p>]]></paragraph>
<paragraph
    title="22.4.11.C.08."

    tags="Infrastructure,Technical,Access Control,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4662"
><![CDATA[<p>Access Controls MUST be implemented in accordance with <a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15348">Chapter 16 – Access Control</a>.</p>]]></paragraph>
<paragraph
    title="22.4.11.C.09."

    tags="Infrastructure,Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4663"
><![CDATA[<p>Agencies MUST maintain a list of permitted operating systems, including operating system version numbers, for BYOD devices.</p>]]></paragraph>
<paragraph
    title="22.4.11.C.10."

    tags="Infrastructure,Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4664"
><![CDATA[<p>Agencies MUST check each BYOD device for malware and sanitise the device appropriately before installing agency software or operating environments.</p>]]></paragraph>
<paragraph
    title="22.4.11.C.11."

    tags="Infrastructure,Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4665"
><![CDATA[<p>Agencies MUST check each BYOD device for malware and sanitise the device appropriately before permitting access to agency data.</p>]]></paragraph>
<paragraph
    title="22.4.11.C.12."

    tags="Infrastructure,Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4666"
><![CDATA[<p>BYOD MUST have a Mobile Device Management (MDM) solution implemented with a minimum of the following enabled:</p>
<ul>
<li>The MDM is enabled to “wipe” devices of any agency data if lost or stolen;</li>
<li>If the MDM cannot discriminate between agency and personal data, all data, including personal data, is deleted if the device is lost or stolen;</li>
<li>The MDM is capable of remotely applying agency security configurations for BYOD devices;</li>
<li>Mobile device security configurations are validated (health check) by the MDM before a device is permitted to connect to the agency’s systems;</li>
<li>“Jail-broken”, “rooted” or settings violations MUST be detected and isolated;&nbsp;</li>
<li>“Jail-broken” devices are NOT permitted to access agency resources;&nbsp;</li>
<li>Access to agency resources is limited until both the device and user is fully compliant with policy and SOPs;</li>
<li>Auditing and logging is enabled; and</li>
<li>Changes of Subscriber Identity Module (SIM) card are monitored to allow remote blocking and wiping in the event of theft or compromise.</li>
</ul>]]></paragraph>
<paragraph
    title="22.4.11.C.13."

    tags="Infrastructure,Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4667"
><![CDATA[<p>Intrusion detection systems MUST be implemented.</p>]]></paragraph>
<paragraph
    title="22.4.11.C.14."

    tags="Infrastructure,Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4668"
><![CDATA[<p>Continuous monitoring MUST be established to detect actual or potential security compromises or incidents from BYOD devices. &nbsp;Refer also to <a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13001">Chapter 6 - Information Security Monitoring</a>.</p>]]></paragraph>
<paragraph
    title="22.4.11.C.15."

    tags="Cloud Computing,Infrastructure,Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4669"
><![CDATA[<p>Agencies MUST maintain a list of approved cloud applications that may be used on BYOD devices.</p>]]></paragraph>
<paragraph
    title="22.4.11.C.16."

    tags="Cloud Computing,Infrastructure,Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4670"
><![CDATA[<p>Agencies MUST block the use of unapproved cloud applications for processing any agency or organisational data.</p>]]></paragraph>
<paragraph
    title="22.4.11.C.17."

    tags="Infrastructure,Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must Not"
    cid="4671"
><![CDATA[<p>BYOD devices MUST NOT be permitted direct connection to internal hosts, including all other devices on the local network.</p>]]></paragraph>
<paragraph
    title="22.4.11.C.18."

    tags="Cloud Computing,Infrastructure,Technical,Mobile Devices,BYOD,Public cloud security"


    classification="All Classifications"
    compliance="Must Not"
    cid="4672"
><![CDATA[<p>BYOD devices connecting to guest and public facing networks MUST NOT be permitted access to the corporate network other than through a VPN over the Internet.</p>]]></paragraph>
<paragraph
    title="22.4.11.C.19."

    tags="Bluetooth,Infrastructure,Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Should"
    cid="4674"
><![CDATA[<p>Bluetooth on BYOD devices SHOULD be disabled while within agency premises and while accessing agency systems and data.</p>]]></paragraph>
<paragraph
    title="22.4.11.C.20."

    tags="Infrastructure,Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Should"
    cid="4675"
><![CDATA[<p>BYOD devices and systems SHOULD use Multi-factor (at least two-factor) authentication to connect to agency systems and prior to being permitted access to agency data.</p>]]></paragraph>
</block>
<block title="Wireless IDS / IPS systems"><paragraph
    title="22.4.12.R.01."

    tags="Technical,Mobile Devices,BYOD"


><![CDATA[<p>Devices will automatically associate with the strongest signal and associated Access Point (AP). &nbsp;A rogue AP may belong to another organisation in an adjacent building, contractor, customer, supplier or other visitor. &nbsp;Association with a rogue AP can provide a means for the installation of malware.</p>]]></paragraph>
<paragraph
    title="22.4.12.R.02."

    tags="Technical,Mobile Devices,BYOD"


><![CDATA[<p>Wireless IDS / IPS systems have the ability to detect rogue wireless AP’s by channel, MAC address, frequency band and SSID. &nbsp;They can continuously monitor wireless networks and detect and block denial-of-service and adversary-in-the-middle wireless attacks. &nbsp;Establishing baselines of known authorised and unauthorised devices and AP’s will assist in detecting and isolating any rogue devices and AP’s.</p>]]></paragraph>
<paragraph
    title="22.4.12.C.01."

    tags="Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4679"
><![CDATA[<p>Agencies MUST implement a wireless IDS /IPS on BYOD wireless networks.</p>]]></paragraph>
<paragraph
    title="22.4.12.C.02."

    tags="Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4680"
><![CDATA[<p>Agencies MUST implement rogue AP and wireless “hot spot” detection and implement response procedures where detection occurs.</p>]]></paragraph>
<paragraph
    title="22.4.12.C.03."

    tags="Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Should"
    cid="4681"
><![CDATA[<p>Agencies SHOULD conduct a baseline survey to identify:</p>
<ul>
<li>All authorised devices and AP’s; and</li>
<li>Any unauthorised devices and AP’s.</li>
</ul>]]></paragraph>
</block>
<block title="BYOD Device Controls"><paragraph
    title="22.4.13.R.01."

    tags="Technical,Mobile Devices,BYOD"


><![CDATA[<p>Mobile devices are susceptible to loss, theft and being misplaced. &nbsp;These devices can be easily compromised when out of the physical control of the authorised user or owner. &nbsp;To protect agency systems it is important that BYOD devices are also secured and managed on an ongoing basis.</p>]]></paragraph>
<paragraph
    title="22.4.13.C.01."

    tags="Encryption,Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4684"
><![CDATA[<p>Any agency data exchanged with the mobile device MUST be encrypted in transit (See <a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15745">Chapter 17 – Cryptography</a>).</p>]]></paragraph>
<paragraph
    title="22.4.13.C.02."

    tags="Encryption,Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4685"
><![CDATA[<p>Any agency data stored on the device MUST be encrypted (including keys, certificates and other essential session establishment data).</p>]]></paragraph>
<paragraph
    title="22.4.13.C.03."

    tags="Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4686"
><![CDATA[<p>The use of virtual containers, sandboxes, wraps or similar mechanisms on the mobile device MUST be established for each authorised session for any organisational data. &nbsp;These mechanisms MUST be non-persistent and be removed at the end of each session.</p>]]></paragraph>
<paragraph
    title="22.4.13.C.04."

    tags="Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4687"
><![CDATA[<p>Any sensitive agency data MUST be removed and securely deleted, or encrypted at the end of a session.</p>]]></paragraph>
<paragraph
    title="22.4.13.C.05."

    tags="Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4688"
><![CDATA[<p>Connections to the agency network MUST be time limited to avoid leaving a session “logged on”.</p>]]></paragraph>
<paragraph
    title="22.4.13.C.06."

    tags="Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4689"
><![CDATA[<p>Communications between the mobile device and the agency network MUST be established through a Virtual Private Network (VPN).</p>]]></paragraph>
<paragraph
    title="22.4.13.C.07."

    tags="Technical,Mobile Devices,BYOD,Split tunnelling"


    classification="All Classifications"
    compliance="Must"
    cid="4690"
><![CDATA[<p>Agencies MUST disable split-tunnelling when using a BYOD device to connect to an agency network (See <a href="http://nzism.gcsb.govt.nz/ism-document#Section-17004">Section 21.1 – Agency Owned Mobile Devices</a>).</p>]]></paragraph>
<paragraph
    title="22.4.13.C.08."

    tags="Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4691"
><![CDATA[<p>Agencies MUST disable the ability for a BYOD device to establish simultaneous connections (e.g. wireless and cellular) when connected to an agency’s network.</p>]]></paragraph>
<paragraph
    title="22.4.13.C.09."

    tags="Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Must"
    cid="4692"
><![CDATA[<p>The use of passwords or PINs to unlock the BYOD device MUST be enforced in addition to all other agency authentication mechanisms.</p>]]></paragraph>
<paragraph
    title="22.4.13.C.10."

    tags="Technical,Mobile Devices,BYOD,Passwords"


    classification="All Classifications"
    compliance="Must"
    cid="4693"
><![CDATA[<p>BYOD device passwords MUST be distinct from any agency access and authentication passwords.</p>]]></paragraph>
<paragraph
    title="22.4.13.C.11."

    tags="Technical,Mobile Devices,BYOD,Passwords"


    classification="All Classifications"
    compliance="Must"
    cid="4694"
><![CDATA[<p>BYOD passwords MUST be distinct from other fixed or mobile agency network passwords (See <a href="http://nzism.gcsb.govt.nz/ism-document#Section-15349">Section 16.1 – Identification and Authentication</a> for details on password requirements).</p>]]></paragraph>
</block>
<block title="Additional Controls"><paragraph
    title="22.4.14.R.01."

    tags="Technical,Mobile Devices,BYOD"


><![CDATA[<p>There are many new devices and operating system versions being frequently released. &nbsp;It may not be feasible or cost-effective for an agency to support all combinations of device and operating system.</p>]]></paragraph>
<paragraph
    title="22.4.14.C.01."

    tags="Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Should"
    cid="4697"
><![CDATA[<p>Agencies SHOULD compile a list of approved BYOD devices and operating systems for the guidance of staff.</p>]]></paragraph>
<paragraph
    title="22.4.14.C.02."

    tags="Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Should"
    cid="4698"
><![CDATA[<p>Agencies SHOULD consider the implementation of Data Loss Prevention (DLP) technologies.</p>]]></paragraph>
<paragraph
    title="22.4.14.C.03."

    tags="Data Management,Technical,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Should"
    cid="4699"
><![CDATA[<p>Agencies SHOULD consider the use of bandwidth limits as a means of controlling data downloads and uploads.</p>]]></paragraph>
<paragraph
    title="22.4.14.C.04."

    tags="Governance,Mobile Devices,BYOD"


    classification="All Classifications"
    compliance="Should"
    cid="4700"
><![CDATA[<p>Agencies SHOULD take legal advice on the provisions in their BYOD policy.</p>]]></paragraph>
</block>
</subsection>
</section>
