Crowdstrike – What is the Principle of Least Priviledge (POLP)? 3.1 3.1.5 Access Control
Crowdstrike webpage providing security tips and resources for considerations on least privilege.
Crowdstrike webpage providing security tips and resources for considerations on least privilege.
This article from Federal News Network provides an overview of key controls that are essential to NIST SP 800-171 compliance: access controls, awareness and training, audit and accountability, configuration management, and identification and authentication.
This article provides an overview of the risks associated with removable media for industrial facilities based on a 2020 Honeywell report.
This website from Gartner provides reviews and rating for PAM Tools.
When you walk away from your computer, you want to make sure to lock it so other people can’t access your machine and its data. You can, of course, manually lock your Windows 11 PC down by hitting Windows Key + L or Ctrl + Alt + Del. But sometimes you forget. The cool thing is you can make Windows 11 lock automatically after a set time of inactivity. Here is a look at a few ways you can set this up.
An example of a screenlocking standard, used by academia.
This ISOO presentation describes CUI program and what it is that needs to be protected.
This article provides an overview of removable media including the risks associated with this technology and how to implement a control policy.
This article describes techniques for automating the management of Apple iOS devices that will allow an admin to push polices such as “Idle-time logoff” to a MAC instead of touching each machine. NIST 800-171 Control: 3.1.11
This article from ISACA provides an overview of the implementation of SoD based on practical experiences.