For managed endpoints, universally enforce policies through one or more centralized configuration management tools.
Use risk assessment to determine what (if any) information or systems may be accessed or stored using unmanaged endpoints.
Define, document, apply and evaluate a list of approved services, applications and sources of applications (stores) acceptable for use by endpoints when accessing or storing organization-managed data.