Groovy Post – How to Make Windows 10 Lock Automatically After a Set Amount of Inactivity
3.1 3.1.10 Access Control
https://www.groovypost.com/howto/make-windows-10-lock-automatically-after-a-set-amount-of-inactivity/
When you walk away from your computer, you want to make sure to lock it so other people can’t access your machine and its data. You can, of course, manually lock your Windows 10 PC down by hitting Windows Key + L or Ctrl + Alt + Del. But sometimes you forget. The cool thing is you can make Windows 10 lock automatically after a set time of inactivity. Here is a look at a few ways you can set this up.
Indiana State University – Standard for Screen Locking
3.1 3.1.10 Access Control
https://indstate.teamdynamix.com/TDClient/1851/Portal/KB/ArticleDet?ID=85670
An example of a screenlocking standard, used by academia.
Information Security Oversight Office – CUI Presentation
3.1 3.1.3 Access Control
https://www.nist.gov/system/files/documents/2018/10/18/cui18oct2018-0930-1030-cui_overview-casey.pdf
This ISOO presentation describes CUI program and what it is that needs to be protected.
https://www.infosecinstitute.com/resources/security-awareness/security-awareness-hazards-removable-media/
This article provides an overview of removable media including the risks associated with this technology and how to implement a control policy.
InfoWorld – Manage those Macs: A guide for Windows admins / Set your Mac to log out when not in use
3.1 3.1.11 Access Control
https://www.infoworld.com/article/3055211/manage-those-macs-a-guide-for-windows-admins.html
This article describes techniques for automating the management of Apple iOS devices that will allow an admin to push polices such as “Idle-time logoff” to a MAC instead of touching each machine. NIST 800-171 Control: 3.1.11
ISACA – Implementing Segregation of Duties: A Practical Experience Based on Best Practices
3.1 3.1.4 Access Control
https://www.isaca.org/resources/isaca-journal/issues/2016/volume-3/implementing-segregation-of-duties-a-practical-experience-based-on-best-practices
This article from ISACA provides an overview of the implementation of SoD based on practical experiences.
ISACA Journal – Capability Framework for Privileged Access Management
3.1 3.1.15 Access Control
https://www.isaca.org/resources/isaca-journal/issues/2017/volume-1/capability-framework-for-privileged-access-management
This article discusses the elements required of a privileged access program that need to be in place to authorize execution of privileged access commands (PACs) and monitor the use of PACs whether on-line or remote. The whole document is useful, but the section on Privileged Users provides specific guidance how to control who has the right to use PACs
https://www.isaca.org/resources/isaca-journal/issues/2018/volume-1/data-loss-preventionnext-steps
This article provides a comprehensive description of Data Loss Prevention (DLP). The article includes best Practices for DLP planning and preparation, and tools for automating DLP.
Linux / UNIX Automatically Logout BASH / TCSH / SSH Users After a Period of Inactivity
3.1 3.1.11 Access Control
https://www.cyberciti.biz/faq/linux-unix-login-bash-shell-force-time-outs/
This document along with the comments section list Unix scripts that can be used to automatically terminate user sessions.
https://www.mcafee.com/en-us/antivirus/mcafee-total-protection.html
McAfee Total Protection to reduce the attack surface