U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

This is an archive
(replace .gov by .rip)

SP 800-46 Rev. 2 (Draft)

Guide to Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) Security

Date Published: March 2016
Comments Due: April 15, 2016 (public comment period is CLOSED)
Email Questions to: 800-46comments@nist.gov

Author(s)

Murugiah Souppaya (NIST), Karen Scarfone (Scarfone Cybersecurity)

Announcement

NIST requests public comments on two draft Special Publications (SPs) on telework and BYOD security: Draft SP 800-46 Revision 2, Guide to Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) Security, and Draft SP 800-114 Revision 1, User's Guide to Telework and Bring Your Own Device (BYOD) Security. Organizations are increasingly threatened, attacked, and breached through compromised telework devices used by their employees, contractors, business partners, and vendors. These publications make recommendations for organizations (in SP 800-46 Revision 2) and users (in SP 800-114 Revision 1) to improve their telework and BYOD security practices.

Abstract

Keywords

information security; network security; remote access; telework; host security; bring your own device (BYOD)
Control Families

Access Control; Configuration Management; Contingency Planning; Identification and Authentication; Media Protection; Risk Assessment; System and Communications Protection; System and Information Integrity

Documentation

Publication:
Draft SP 800-46 Revision 2

Supplemental Material:
None available

Document History:
03/14/16: SP 800-46 Rev. 2 (Draft)
07/29/16: SP 800-46 Rev. 2 (Final)

Topics

Security and Privacy
authentication; contingency planning; threats; vulnerability management

Applications
communications & wireless

Laws and Regulations
OMB Circular A-130