Remote Wiping

Mobile computing devices should comprise secure remote wiping features. While this good practice is in conflict with “ Removing Management Backdoors ”, its use is mandated by international standards when it comes to mobile devices. Thus the security relevance of this good practice should be evaluated for the specific device use case and, if deemed necessary, implemented in a secure way integrating strong authentication and authorization mechanisms.

Further Reading: