^ SYS.3.2.2 ^ Name ^ CIA ^ G 0.11 ^ G 0.13 ^ G 0.14 ^ G 0.15 ^ G 0.16 ^ G 0.17 ^ G 0.18 ^ G 0.19 ^ G 0.21 ^ G 0.22 ^ G 0.23 ^ G 0.24 ^ G 0.25 ^ G 0.28 ^ G 0.29 ^ G 0.30 ^ G 0.31 ^ G 0.32 ^ G 0.36 ^ G 0.37 ^ G 0.38 ^ G 0.39 ^ G 0.45 ^ | **SYS.3.2.2.A1** | Festlegung einer Strategie für das Mobile Device Management | | | | | | | | X | | | | | | | | X | | | | | | | | | | **SYS.3.2.2.A2** | Festlegung erlaubter mobiler Endgeräte | | | | | | | | X | | | | | | | | | | | | | | | | | | **SYS.3.2.2.A3** | Auswahl eines MDM-Produkts | | X | | | | | | X | | | | | | | | | | | | | | | | X | | **SYS.3.2.2.A4** | Verteilung der Grundkonfiguration auf mobile Endgeräte | | | X | X | | | | | | X | X | X | | | | | X | X | | X | | | X | | | **SYS.3.2.2.A5** | Installation des MDM-Clients | | | X | X | | | | | | X | X | X | | | | | X | X | | X | | | X | | | **SYS.3.2.2.A6** | Protokollierung und Gerätestatus | | | | | | | | | | | | | | | | | X | X | X | | X | | | | | **SYS.3.2.2.A7** | Auswahl und Freigabe von Apps | | | | X | | X | | | X | X | X | X | X | X | | X | X | X | X | X | | | X | | | **SYS.3.2.2.A8** | ENTFALLEN | | | | | | | | | | | | | | | | | | | | | | | | | | **SYS.3.2.2.A9** | ENTFALLEN | | | | | | | | | | | | | | | | | | | | | | | | | | **SYS.3.2.2.A10** | ENTFALLEN | | | | | | | | | | | | | | | | | | | | | | | | | | **SYS.3.2.2.A11** | ENTFALLEN | | | | | | | | | | | | | | | | | | | | | | | | | | **SYS.3.2.2.A12** | Absicherung der MDM-Betriebsumgebung | | | | | | | | | | | | X | | | | | X | | X | | | X | | | | **SYS.3.2.2.A13** | ENTFALLEN | | | | | | | | | | | | | | | | | | | | | | | | | | **SYS.3.2.2.A14** | Benutzung externer Reputation-Services für Apps | CI | | | X | | X | | | X | | X | X | | | X | | X | | | X | | | X | | | **SYS.3.2.2.A15** | ENTFALLEN | | | | | | | | | | | | | | | | | | | | | | | | | | **SYS.3.2.2.A16** | ENTFALLEN | | | | | | | | | | | | | | | | | | | | | | | | | | **SYS.3.2.2.A17** | Kontrolle der Nutzung von mobilen Endgeräten | I | | | | | | | | | | | | | | | X | X | X | X | | X | | | | | **SYS.3.2.2.A18** | ENTFALLEN | | | | | | | | | | | | | | | | | | | | | | | | | | **SYS.3.2.2.A19** | Einsatz von Geofencing | CI | | | X | | | | | | | | | | | | | | | | | | | | | | **SYS.3.2.2.A20** | Regelmäßige Überprüfung des MDM | | | | | | | | X | X | X | | X | | | | X | X | X | X | | | | | | | **SYS.3.2.2.A21** | Verwaltung von Zertifikaten | | | | X | X | | | X | X | | X | X | | | | X | X | X | X | X | | X | | | | **SYS.3.2.2.A22** | Fernlöschung und Außerbetriebnahme von Endgeräten | | | | X | X | X | X | X | X | | | | X | | | X | X | | | X | | X | | | | **SYS.3.2.2.A23** | Durchsetzung von Compliance-Anforderungen | CI | | | | | X | | | | X | X | | | | | X | | | | | | | | |