Skip to main content

Mobile Device Security in ISO 27799

$349.00
Toolkit Included:
Includes a practical, ready-to-use toolkit containing implementation templates, worksheets, checklists, and decision-support materials used to accelerate real-world application and reduce setup time.
Who trusts this:
Trusted by professionals in 160+ countries
When you get access:
Course access is prepared after purchase and delivered via email
Your guarantee:
30-day money-back guarantee — no questions asked
How you learn:
Self-paced • Lifetime updates
Adding to cart… The item has been added

This curriculum spans the equivalent of a multi-workshop advisory engagement, covering governance, risk, procurement, technical controls, and stakeholder coordination across the full lifecycle of mobile devices in regulated healthcare environments.

Module 1: Establishing Governance Frameworks for Mobile Devices

  • Define scope of mobile device coverage under ISO 27799, including personally owned devices used in bring-your-own-device (BYOD) arrangements.
  • Select governance roles and responsibilities for mobile security, specifying accountability between IT, security, legal, and clinical departments in healthcare settings.
  • Map mobile device controls to ISO 27799:2018 clauses 5.1 through 5.12, ensuring alignment with information security policies.
  • Develop a formal exception process for devices that cannot comply with baseline security requirements due to clinical necessity.
  • Integrate mobile governance into existing healthcare risk assessment processes, such as those required under HIPAA or GDPR.
  • Establish criteria for approving new mobile platforms (e.g., emerging operating systems) based on vendor support lifecycle and patch frequency.
  • Document decision trails for governance approvals to support audit readiness and regulatory inspections.
  • Implement version control for mobile security policies to ensure consistency across geographically distributed healthcare facilities.

Module 2: Risk Assessment and Threat Modeling for Mobile Endpoints

  • Conduct threat modeling exercises specific to mobile workflows, such as accessing electronic health records (EHR) from public Wi-Fi.
  • Identify high-risk mobile use cases, including emergency access, remote consultations, and device handoffs between shifts.
  • Assess risks associated with sideloaded applications on clinical tablets used for patient intake.
  • Quantify data exposure potential based on device storage capabilities and encryption status.
  • Factor in physical security risks, such as device theft in outpatient clinics with open workspaces.
  • Update risk registers to reflect mobile-specific vulnerabilities, such as insecure SMS-based authentication.
  • Validate risk treatment plans with clinical stakeholders to avoid disruption to patient care.
  • Use threat intelligence feeds to adjust risk profiles based on emerging mobile malware targeting healthcare organizations.

Module 3: Mobile Device Procurement and Lifecycle Management

  • Enforce minimum security requirements in procurement contracts, including guaranteed OS update support for at least three years.
  • Implement a device acquisition approval workflow requiring security review before purchase authorization.
  • Standardize on a limited set of approved devices to reduce support complexity and patch management overhead.
  • Configure devices with unique asset identifiers and register them in the organization’s configuration management database (CMDB).
  • Establish decommissioning procedures that include secure data wiping verified by cryptographic erasure logs.
  • Manage end-of-support transitions by scheduling replacements before vendor discontinuation of security patches.
  • Track device ownership changes during staff transfers or departures to maintain accountability.
  • Enforce return policies for organization-owned devices through HR offboarding checklists.

Module 4: Secure Configuration and Hardening Standards

  • Define and enforce baseline configurations for mobile operating systems using mobile device management (MDM) templates.
  • Disable unnecessary services such as Bluetooth, NFC, and camera functions on clinical workflow devices.
  • Enforce strong passcode policies with minimum length, complexity, and retry lockout thresholds.
  • Configure automatic screen lock timeouts based on risk tier (e.g., 1 minute for high-risk areas).
  • Prohibit jailbreaking or rooting through technical controls and policy enforcement mechanisms.
  • Validate configuration compliance through periodic automated audits and generate non-compliance reports.
  • Implement secure boot and integrity checking where supported by device hardware.
  • Restrict sideloading of applications by enforcing app installation only from approved enterprise app stores.

Module 5: Mobile Application Governance and Vetting

  • Establish an application review board to evaluate mobile health (mHealth) apps for compliance with ISO 27799 and data protection laws.
  • Require third-party app vendors to provide evidence of secure development practices and penetration testing.
  • Implement runtime application self-protection (RASP) for internally developed clinical apps.
  • Enforce code signing for all enterprise-distributed mobile applications.
  • Monitor app permissions and restrict access to device functions (e.g., contacts, microphone) based on clinical necessity.
  • Integrate app vulnerability scanning into the CI/CD pipeline for in-house mobile app development.
  • Retire legacy applications that no longer receive security updates or cannot be patched.
  • Log and analyze app usage patterns to detect anomalous behavior indicative of compromise.

Module 6: Data Protection and Encryption Strategies

  • Mandate full-disk encryption on all organization-owned mobile devices using platform-native encryption features.
  • Implement file-level encryption for sensitive health data stored in mobile application sandboxes.
  • Enforce encryption of data in transit using TLS 1.2 or higher for all mobile app communications.
  • Deploy digital rights management (DRM) to control forwarding or copying of clinical documents from mobile devices.
  • Configure remote wipe capabilities that preserve audit logs of the wipe event for compliance purposes.
  • Assess trade-offs between performance impact and encryption strength on low-end devices used in rural clinics.
  • Validate encryption key management practices, ensuring keys are not stored on the device itself.
  • Define data residency rules to prevent unauthorized cross-border transfer of health data via mobile sync features.

Module 7: Identity, Authentication, and Access Control

  • Implement multi-factor authentication (MFA) for access to EHR systems from mobile devices, including push notifications or hardware tokens.
  • Integrate mobile devices with enterprise identity providers using SAML or OIDC protocols.
  • Enforce context-aware access controls that consider location, network, and device posture before granting access.
  • Limit concurrent sessions per user to prevent credential sharing across multiple mobile devices.
  • Establish time-bound access for temporary staff using mobile devices in emergency scenarios.
  • Monitor and alert on repeated failed authentication attempts originating from mobile endpoints.
  • Disable cached credentials after a configurable period of inactivity.
  • Implement just-in-time (JIT) access for elevated privileges requested from mobile admin consoles.

Module 8: Monitoring, Logging, and Incident Response

  • Aggregate mobile device logs (e.g., login attempts, policy violations) into a centralized SIEM system.
  • Define thresholds for automated alerts on suspicious activities, such as geolocation anomalies.
  • Conduct tabletop exercises simulating mobile device loss or compromise in clinical environments.
  • Integrate MDM alerts with the organization’s incident management workflow for triage and resolution.
  • Preserve forensic data from mobile devices in accordance with legal hold requirements.
  • Document incident root causes involving mobile endpoints for inclusion in quarterly risk reporting.
  • Test remote lock and wipe functions regularly to ensure operational readiness.
  • Coordinate with law enforcement when stolen devices contain unencrypted patient data.

Module 9: Compliance Auditing and Continuous Improvement

  • Schedule periodic internal audits of mobile device compliance against ISO 27799 control objectives.
  • Prepare for external audits by maintaining evidence of mobile security controls, including configuration snapshots and logs.
  • Conduct gap analyses after updates to ISO 27799 or related standards to identify control adjustments.
  • Use audit findings to update mobile security policies and retrain affected user groups.
  • Measure control effectiveness using KPIs such as patch compliance rate and time to remediate policy violations.
  • Engage clinical department leads in control validation to ensure usability and adherence.
  • Archive audit reports and supporting documentation for minimum retention periods as defined by regulatory requirements.
  • Implement corrective action plans for recurring non-conformities identified in mobile device management.

Module 10: Change Management and Stakeholder Engagement

  • Require formal change requests for modifications to mobile security baselines, including risk assessment impact statements.
  • Coordinate mobile OS upgrade rollouts with clinical scheduling to minimize disruption to patient services.
  • Communicate policy changes to clinicians through departmental champions and role-specific training materials.
  • Establish feedback loops for frontline staff to report usability issues with mobile security controls.
  • Conduct impact assessments before enforcing new restrictions on personal devices in BYOD programs.
  • Manage resistance to biometric authentication by providing opt-out procedures with compensating controls.
  • Align mobile security initiatives with broader digital transformation projects in healthcare delivery.
  • Report mobile risk posture to executive leadership and board committees using non-technical summaries.