Professional Documents
Culture Documents
CIS Controls v8 Mobile Companion Guide
CIS Controls v8 Mobile Companion Guide
v8
Mobile Companion
Guide
Version 8
CIS Controls v8
Mobile Companion Guide
Acknowledgments The Center for Internet
Security, Inc. (CIS) is
CIS would like to thank the many security experts who volunteer their time and talent a 501(c)(3) nonprofit
to support the CIS Controls® and other CIS work. CIS products represent the effort of organization whose
a veritable army of volunteers from across the industry, generously giving their time mission is to make the
and talent in the name of a more secure online experience for everyone. connected world a safer
place by developing,
Editors validating, and promoting
Chris Crowley, Montace®, Sean Frazier, Okta, and Joshua M Franklin, CIS timely best practice
solutions that help
Contributors people, businesses, and
Eric Green, HSBC; Tim LeMaster, Lookout; Tyler Desjardins, CISSP, Arctic Wolf; governments protect
Stephen Campbell, Non-State Threat Intelligence, LLC; Thomas Sager, CIS; Robin themselves against
Regnier, CIS pervasive cyber threats.
To further clarify the Creative Commons license related to the CIS Controls® content,
you are authorized to copy and redistribute the content as a framework for use by
you, within your organization and outside of your organization, for non-commercial
purposes only, provided that (i) appropriate credit is given to CIS, and (ii) a link to
the license is provided. Additionally, if you remix, transform, or build upon the CIS
Controls, you may not distribute the modified materials. Users of the CIS Controls
framework are also required to refer to (http://www.cisecurity.org/controls/) when
referring to the CIS Controls in order to ensure that users are employing the most up-
to-date guidance. Commercial use of the CIS Controls is subject to the prior approval
of the Center for Internet Security, Inc. (CIS®).
May 2021
Contents
Overview
Introduction...........................................................................................................2
Methodology..........................................................................................................4
Relevant Enterprise Technology 4
Mobility Deployment Model Descriptions 5
Definition and Scope 6
EMM Configuration 6
Applicability Overview 6