Department of Homeland Security – Configuring and Managing Remote Access for Industrial Control Systems
3.7 3.7.5 3.7.6
https://www.cisa.gov/sites/default/files/recommended_practices/RP_Managing_Remote_Access_S508NC.pdf
From the Department of Homeland Security, these are recommended practices for configuring and managing remote access for control systems covering various roles including vendors, field technicians, business partners (all of which may have differing requirements.)
https://www.diskwipe.org/
Disk Wipe is Free, portable Windows application for permanent volume data destruction.
https://fossbytes.com/best-hard-drive-eraser-tools/
This is an article from Fossbytes that provides a list of six best hard drive eraser tools.
https://www.infosecinstitute.com/resources/security-awareness/security-awareness-hazards-removable-media/
This article provides an overview of removable media including the risks associated with this technology and how to implement a control policy.
Iron Mountain – Data Wiping: On ITAD and Secure Sanitization of Your Virtual and Physical IT Assets
3.7 3.7.3 3.8 3.8.3 Maintenance Media Protection
https://www.ironmountain.com/en-in/resources/blogs-and-articles/d/data-wiping-on-itad-and-secure-sanitization-of-your-virtual-and-physical-it-assets
This is an article from Iron Mountain on data wiping and secure sanitization of virtual and physical IT assets.
https://www.irs.gov/privacy-disclosure/media-sanitization-guidelines
These are the guidelines by the IRS for media sanitization.
https://www.kaseya.com/blog/patch-management-policy/
In this blog, Kaseya will discuss patch management policy best practices and explain how they contribute to a better patching environment for large and small organizations alike.
https://www.lifewire.com/free-data-destruction-software-programs-2626174
This is a blog from lifewire that provides a review of the 40 best free programs for data destruction software programs.
https://www.mcafee.com/en-us/antivirus/mcafee-total-protection.html
McAfee Total Protection to reduce the attack surface
Medium – Monitoring Applications to Prevent Unauthorized Access
3.7 3.7.6 Maintenance
https://medium.com/@cybersiftIO/monitoring-applications-to-prevent-unauthorised-access-ea79d64dba5c
Privileged account access and how it can be used in a malicious way to gain access and how to protect against it.