4/1/2023 0 Comments Endpoint security standard![]() ![]() See the Media Control and Disposal Policy.įollow the principle of least privilege for use and assignment of privileges. Overwrite data from hard drives before disposal of old equipment. Keep laptops with you at all times or stored in a secured location. ![]() Locate desktops in an access-controlled environment. Implement PCI DSS, HIPAA, or export controls as applicable. Uninstall or disable unnecessary operating systems, applications, browsers, email clients, and extensions. where security updates and patches are still available). Install and use only operating systems, applications, browsers, and email clients supported by the vendor (i.e. Select an appropriate Duke service for storing Duke-data depending on the data classification see Duke Services and Data Classification.Įnroll devices in one of Duke's endpoint management services ( ).ĭesignate in Planisphere a support group that is responsible for the machine's security configuration and complete and maintain the asset inventory information. Install CrowdStrike Falcon for malware and threat protection and ensure the CrowdStrike Falcon software maintains communication with the management console. Use automated patching tools to apply operating system patches and, when possible, application patches.Įnable whole-disk encryption (FileVault2 for Mac, BitLocker for Windows) for laptops and desktops. Mitigate operating system and application vulnerabilities following the timelines established in Vulnerability Management Procedure. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |