Limited Time Offer: Save up to 20% on a new CIS SecureSuite Membership | Learn more
Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world

About Us Leadership Principles Testimonials


secure your organization
Secure Your Organization

secure specific platforms
Secure Specific Platforms

cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments

View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities

CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers




filter by topic
Filter by Topic

View All Resources  
CIS Logo Show Search Expand Menu

CIS Controls v8 Mobile Companion Guide

The security challenges facing the usage of mobile devices in the enterprise warrant additional attention. While many of the core security concerns of enterprise IT systems are shared by mobile devices and their management systems, unique challenges exist.

This guide offers a consistent approach for analyzing CIS Controls in the context for mobile. For each of the CIS Controls, the following information is provided:

ApplicabilityThe applicability field assesses the degree to which a CIS Control functions within the mobile space.

Deployment ConsiderationsDeployment considerations analyze if specific mechanisms are needed for a particular mobile deployment model, such as BYOD or fully-managed. Unmanaged deployment models are not addressed, as all mobile devices used for work tasks should be managed in some way, either via technical and/or procedural means, or via policy.

Additional DiscussionThis is a general area for any guidance that also needs to be noted. For instance, relevant tools, products, or threat information that could be of use can be placed here.