- 
	
What devices are allowed?
	 
	- 
	
Who decides what devices are allowed?
	 
	- 
	
How do they decide?
	 
	- 
	
How do we audit against adherence to the policy?
	 
	- 
	
Who is responsible for tracking devices and ensuring that they’re updated?
	 
	- 
	
Do we allow exceptions to the policy? If so, how do we manage exceptions?
	 
	- 
	
If someone deploys unauthorized devices, how will we know? What actions will be taken?
	 
	- 
	
Do we have one policy for all devices, or different policies for different types of devices?
	 
	- 
	
How are we ensuring that our policies adequately reflect the needs of end users?
	 
	- 
	
How are we ensuring that our policies adequately reflect the needs of line of business managers?
	 
	- 
	
How do we ensure that people are aware of the strategy and incorporate that into their way of working?
	 
	- 
	
How do we change and adapt the strategy over time to react to changes in technology and the business landscape?
	 
	- 
	
If we are willing to accept devices with known vulnerabilities, who is authorized to approve them, and how will we hold that person accountable for accepting the risk?