Apple – Set your Mac to log out when not in use 3.1 3.1.11 Access Control
This article shows the actual configuration that would be set to terminate user sessions after a set period of time. It would be best to automate this.
This article shows the actual configuration that would be set to terminate user sessions after a set period of time. It would be best to automate this.
This webpage provides the reader a basic understanding of the various wireless encryption types.
This article provides an overview of steps organizations can take to reduce remote access security risks.
This Boston University guidance defines the requirements for handling and protecting information, including CUI. The document links to other useful sites (e.g. Data Classification Policy, Data Access Management Policies) that expand on the control of CUI and authorizations to access CUI.
A sample identity and access management policy for Boston University.
Video presented by Thycotic discussing risks and mitigations for privileged accounts.
Video presented by Thycotic discussing risks and mitigations for privileged accounts.
This is an example of a separation of duties policy posted by Brookhaven National Laboratory.
This guideline provides an example of Data Classification framework that defines categories for data.
This article provides an overview of how to test wireless security for an enterprise, providing an understanding of wireless and the risks and vulnerabilities involved with its use.