Apple – Set your Mac to log out when not in use 3.1 3.1.11 Access Control
This article shows the actual configuration that would be set to terminate user sessions after a set period of time. It would be best to automate this.
This article shows the actual configuration that would be set to terminate user sessions after a set period of time. It would be best to automate this.
This webpage provides the reader a basic understanding of the various wireless encryption types.
This article provides an overview of steps organizations can take to reduce remote access security risks.
This Boston University guidance defines the requirements for handling and protecting information, including CUI. The document links to other useful sites (e.g. Data Classification Policy, Data Access Management Policies) that expand on the control of CUI and authorizations to access CUI.
This is an example of a separation of duties policy posted by Brookhaven National Laboratory.
This guideline provides an example of Data Classification framework that defines categories for data.
This article provides an overview of how to test wireless security for an enterprise, providing an understanding of wireless and the risks and vulnerabilities involved with its use.
This article discusses a foundational component necessary to govern the posting of information: Data Classification.
This article from CIO provides seven best practices to help companies secure their mobile envrionments.
The intended purpose of this document is to provide guidelines for proper planning, preparation, and identification of the key items to check through the analysis of a survey report.