CISA's Mobile Device Cybersecurity Checklist compliance
CISA’s principles applying to mobile and application security
Good app security
Companies should use curated and official app stores, as their applications are more secure than those from unofficial sources. Enterprise applications should be isolated from personal ones, especially on personally owned devices. Organizations should also implement an application vetting strategy for internally developed applications.
Security-focused device management
Protected network communications
Protected devices
How to comply
To meet CISA’s checklist, organizations should deploy a Mobile Threat Defense solution like Pradeo’s, which monitors device behavior, configurations, and defends against malware, phishing, and network exploits. For devices used for both personal and business purposes, combining an MDM with MTD enables secure separation of work apps from personal ones.
Finally, organizations developing their own mobile applications must implement a vetting strategy. Pradeo’s Application Security Testing (AST) enables easy and centralized analysis and protection of all enterprise-developed applications.
For fully personal devices occasionally used for business, a private store is recommended. This secure, white-label application gathers all company applications, resources, and data in one protected space.