Rules-Based Access and Controls and Device Health Statuses
Agencies can instead provide more rules-based access and controls to better determine when and where users have access to specific data and applications. That means IT staff needs to be able to quickly assess “why this device is talking to that data set or why this person is on this device, at this time, from that location,” Feibus said.
Security teams could also require that devices have a certain health status, with the most up-to-date software and operating systems, before allowing access to work materials, said Kern Smith, vice president at mobile security company Zimperium.
Federal IT shops are better equipped now to manage the vulnerabilities that come from the modern, work-from-anywhere environment.
“Organizations are saying, ‘OK, the mobility standards that I wrote 10, 15 years ago when we were all using BlackBerries, maybe let’s go back and revisit them now that we have the MITRE mobile ATT&CK framework, now that we have the NIST guidelines,’” Smith said.