A risk assessment indicates the residual risk associated with a new bring your own device (BYOD) program is within organizational risk tolerance. This means that the potential benefits of BYOD outweigh the potential risks, and that the controls in place are adequate to mitigate those risks.
The next step for the risk practitioner is to identify log sources to monitor BYOD usage and risk impact. Log sources are records of events or activities that occur in a system or network, such as file access, network traffic, user behavior, etc. Log sources can provide valuable information about how BYOD devices are used, what data they access, what applications they run, what threats they encounter, etc.
By monitoring log sources, the risk practitioner can track and measure the actual performance and security of BYOD devices, compare them with the expected outcomes and standards,identify any deviations or anomalies that may indicate a breach or a vulnerability, and take appropriate actions to address them.
Therefore, identifying log sources to monitor BYOD usage and risk impact is a recommended action after a successful risk assessment.
The references for this answer are:
Risk IT Framework, page 10
Information Technology & Security, page 4
Risk Scenarios Starter Pack, page 2