# Mobile Access Policy and Mobile Device Posture Assessment

Cloudbrink's Mobile Access Policy enables administrators to customize accessible applications distinctly for mobile and desktop platforms, accommodating the variance in application usage across devices. Mobile Device Posture Assessment enables administrators to strengthen their security posture by ensuring only trusted devices are used by the users to access business applications&#x20;

#### &#x20;Overview&#x20;

With 13.1, Cloudbrink supports two new features that will augment the Brink Apps on mobile iOS/ iPadOS and Android platforms.&#x20;

Mobile Access Policy&#x20;

Mobile Device Posture Assessment&#x20;

#### Mobile Access Policy&#x20;

Mobile access policies are a new configuration entity on the Cloudbrink administration portal that allows administrators to define separate sets of applications accessible over mobile platforms and desktop platforms.&#x20;

The applications that users typically access over laptops are different than applications over mobile devices, though there are a subset of common applications. For example, users access datacenter servers (e.g., SSH, RDP) on laptops but not mobiles whereas an e-mail client is a common application on both platforms.&#x20;

To provide the flexibility for administrators to define application sets for laptops and mobiles, a Cloudbrink mobile access policy configuration can be implemented.&#x20;

NOTE: If a Mobile Access Policy configuration is not used, mobile platforms also will use same application set (resource-template) as that of the laptops.&#x20;

#### &#x20;Configuration&#x20;

1. Log into the Cloudbrink Administrator portal with Administrative privileges&#x20;
2. Create a new resource-template for mobile platforms&#x20;

&#x20;      Configure > Resources >Resource Templates

<figure><img src="/files/bCQGnLrS54Z7WzqUsYGT" alt=""><figcaption></figcaption></figure>

3. Create a new mobile access policy&#x20;

Configure > Policies > Mobile Access Policies > Add&#x20;

4. Select the newly created resource-template for mobile platforms from the drop-down&#x20;

Configure > Policies > Mobile Access Policies&#x20;

<figure><img src="/files/puaRcqjdjo6hTip3XaLk" alt=""><figcaption></figcaption></figure>

<br>

5. Save the newly created mobile access policy&#x20;

Configure > Policies > Mobile Access Policies

<figure><img src="/files/SPOJFPcSclsrVv9zjrc7" alt=""><figcaption></figcaption></figure>

<br>

6. Assign mobile access policy to a device-user-group&#x20;

Configure > Device User Groups > Device User Group Policies&#x20;

<figure><img src="/files/tVfnmjZJ8JBJrbWT6UDE" alt=""><figcaption></figcaption></figure>

With the above sample configuration, users belonging to “VPN\_ODBT” device-user-group will be able to access apps defined in resource-template “VPN Template” from their laptops and apps defined in resource-template “Mobile\_resource\_template” which is selected in the Mobile\_access policy from their mobile devices.&#x20;

#### Mobile Device Posture Assesment&#x20;

Administrators can strengthen their security posture by ensuring only trusted devices are used by the users to access business applications. As part of the Cloudbrink Zero-Trust Security stack, Cloudbrink now supports device posture assessment for mobile platforms.&#x20;

The advantages of the current device posture assessment feature for laptops are extended to mobile platforms as well.&#x20;

1. Continuous device posture assessment: The device posture checks that an administrator has defined are executed periodically (the interval is configurable, default is 30 minutes) even if the user is not logged out of Cloudbrink. This will ensure that Cloudbrink can detect out-of-compliance devices in the shortest time possible.&#x20;
2. Quarantine/Deny/Log\_and\_Allow actions: Administrators may choose to treat non-compliance devices in different ways. Administrators can either block the non-compliance device completely (Deny action) or put the device in a quarantine state with limited app access (Quarantine action) or simply allow full access but notify the administrator about non-compliance state (Log\_and\_Allow action)&#x20;

#### Configuration&#x20;

1. Create a new Device Posture Assessment profile with Mobile DPA checks&#x20;

Configure > Policies > Device Security Posture Assessment (DSPA) Profiles&#x20;

<figure><img src="/files/TG6XwuSHgU5LJpBJSPj9" alt=""><figcaption></figcaption></figure>

<br>

2. Create a new Device Posture Assessment policy by using the profile created in step-1, and set continuous check to 30 minutes&#x20;

Configure > Policies > Device Security Posture Assessment (DSPA) Policies

&#x20;

<figure><img src="/files/Yp1HeCe5tXWzYU7lKt67" alt=""><figcaption></figcaption></figure>

<br>

3. Update the existing Mobile Access Policy (or create a new mobile access policy if one does not exist) and select the newly created Device Posture Assessment policy from the drop-down&#x20;

Configure > Policies > Mobile Access Policies

<figure><img src="/files/hasiJf37qrLoVhjGlxQL" alt=""><figcaption></figcaption></figure>

With the above configuration, users can access business apps defined in the Mobile\_resource\_ template only if their device is not jailbroken (iOS/iPadOS) or rooted (Android). If the device is jailbroken/rooted, access will be denied (Deny action) to these business apps.&#x20;

#### Support&#x20;

We would love to hear from you! For any questions, concerns, or feedback regarding these features, please reach out at <support@cloudbrink.com>


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.cloudbrink.com/configuration/mobile-access-policy-and-mobile-device-posture-assessment.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
