A company has a security policy that specifies all endpoint computing devices should be assigned a unique
identifier that can be tracked via an inventory management system. Recent changes to airline security
regulations have cause many executives in the company to travel with mini tablet devices instead of laptops.
These tablet devices are difficult to tag and track. An RDP application is used from the tablet to connect into the
company network. Which of the following should be implemented in order to meet the security policy
requirements?
A.
Virtual desktop infrastructure (IDI)
B.
WS-security and geo-fencing
C.
A hardware security module (HSM)
D.
RFID tagging system
E.
MDM software
F.
Security Requirements Traceability Matrix (SRTM)