Indiana State University – Standard for Screen Locking 3.1 3.1.10 Access Control
An example of a screenlocking standard, used by academia.
An example of a screenlocking standard, used by academia.
This ISOO presentation describes CUI program and what it is that needs to be protected.
This article provides an overview of removable media including the risks associated with this technology and how to implement a control policy.
This article describes techniques for automating the management of Apple iOS devices that will allow an admin to push polices such as “Idle-time logoff” to a MAC instead of touching each machine. NIST 800-171 Control: 3.1.11
This article from ISACA provides an overview of the implementation of SoD based on practical experiences.
This article discusses the elements required of a privileged access program that need to be in place to authorize execution of privileged access commands (PACs) and monitor the use of PACs whether on-line or remote. The whole document is useful, but the section on Privileged Users provides specific guidance how to control who has the right to use PACs
This article provides a comprehensive description of Data Loss Prevention (DLP). The article includes best Practices for DLP planning and preparation, and tools for automating DLP.
This document along with the comments section list Unix scripts that can be used to automatically terminate user sessions.
McAfee Total Protection to reduce the attack surface
This article describes how to set an account lockout policy.