https://access.redhat.com/solutions/68164
This documentation from Red Hat, provides an administrator step by step instructions for configuring a lockout policy based on inactivity.
https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/7/html/security_guide/sec-using-usbguard
The USBGuard software framework provides system protection against intrusive USB devices by implementing basic whitelisting and blacklisting capabilities based on device attributes.
http://oirap.rutgers.edu/msa/Documents/OIT-WirelessLAN-Policy.pdf
This sample policy from Rutgers is an example of how an organization can define the requirements associated with access to, and usage of, wireless networks.
https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/bltea59236f183ab31b/5e9e06135352ae292603886c/removable_media_policy.pdf
This sample policy provided by SANS discusses removable media.
SANS – SEC575: iOS and Android Application Security Analysis and Penetration Testing
3.1 3.1.18 3.1.19 Access Control
https://www.sans.org/cyber-security-courses/ios-android-application-security-analysis-penetration-testing/
This SANS course will prepare you to effectively evaluate the security of iOS and Android mobile devices, assess and identify flaws in mobile applications, and conduct a mobile device penetration test, which are all critical skills required to protect and defend mobile device deployments. You will learn how to pen test the biggest attack surface in your organization; dive deep into evaluating mobile apps and operating systems and their associated infrastructure; and better defend your organization against the onslaught of mobile device attacks.
https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/blte0e352dc1934ea5f/5e9dfb76d5a1cb709eee4a6e/wireless_communication_policy.pdf
This policy from SANS provides an example of the conditions that wireless infrastructure devices must satisfy to connect to a company network.
https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/blt836d5fac43a8727f/5e9dfd035661cd12411d53a6/wireless_communication_standard.pdf
This is a sample wireless communication standard for enterprise customization and implementation.
https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/blt957812312514f63a/5e9df9554c47dc64d2a649d0/remote_access_policy.pdf
This sample policy provided by SANS can be customized and used to address remote access.
https://www.sans.org/newsletters/ouch/securing-your-mobile-devices/
Some simple steps to keep you and your devices safe and secure.
SANS Whitepaper – A Secure Approach to Deploying Wireless Networks
3.1 3.1.16 3.1.17 Access Control
https://www.sans.org/white-papers/37342/
This SANS whitepaper discusses how to deploy secure Enterprise wireless networks.