SANS Whitepaper – A Secure Approach to Deploying Wireless Networks 3.1 3.1.16 3.1.17 Access Control
This SANS whitepaper discusses how to deploy secure Enterprise wireless networks.
This SANS whitepaper discusses how to deploy secure Enterprise wireless networks.
This SANS whitepaper is a step by step guide for users to be able to secure their wireless networks at home.
This SANS whitepaper discusses a holistic approach to USB port-security.
This whitepaper from SANS discusses elements of a logon banners specific to the United States.
This is a step-by-step procedure to restrict access to security-relevant information to authorized users. This method uses the System Access Control List which provides you information on users who have access to the data and the type of access they have.
How to reduce the risk of a password dictionary attack through an account lockout policy.
This article provides an overview of remote desktop and its capabilities.
This is an example of a policy that fulfills AC.1.1004 Control information posted or processed on publicly accessible information systems.
This article provides companies with ideas on how to mitigate the risk that mobiles carry with them as attackers turn to target them.
The NC policy describes common security controls (e.g., proxies, gateways, routers, firewalls, guards, encrypted tunnels, web content filters, data loss prevention) and their application in controlling information flows. (See Section AC-4 – Information Flow Enforcement, p. 6)