Search for question
Question

Consider the following scenario.

A team within your organization has brought in a WiFi access point and

connected it to mobile phone to share its Internet connection with the team,

bypassing all controls your security personnel have put in place for devices

attached to your network. The team insists that this connection is business

critical and can't shut it down without a workable alternative. They've asked

you to come in and help them figure out how to conduct their business tasks

while maintaining compliance to cybersecurity policies.

Identify what controls you would recommend that implement the principles of

defense in depth while permitting the work the team needs to complete.

Classify those recommended controls according to their objective (prevent,

deter, correct, etc.).

Justify these choices with reference to the risks they're intended to mitigate.