Tech Target – What Is Remote Desktop? 3.1 3.1.12 Access Control
This article provides an overview of remote desktop and its capabilities.
This article provides an overview of remote desktop and its capabilities.
This is an example of a policy that fulfills AC.1.1004 Control information posted or processed on publicly accessible information systems.
This article provides companies with ideas on how to mitigate the risk that mobiles carry with them as attackers turn to target them.
The NC policy describes common security controls (e.g., proxies, gateways, routers, firewalls, guards, encrypted tunnels, web content filters, data loss prevention) and their application in controlling information flows. (See Section AC-4 – Information Flow Enforcement, p. 6)
This post provides information as well as a downloadable worksheet that organizations can use to plan and demonstrate separation of duties.
This article provides an overview of the risks associated with removable media for industrial facilities based on a 2018 Honeywell report.
This example policy from UCSF describes their organized approach in deploying wireless technologies on the enterprise network.
This example IT practices document from UC Santa Cruz lays out practices for protecting restricted data.
The policy provides a background of who is granted privileged access. On page 2, the policy indicates that “If access is required when off-campus, then the user must use the university’s VPN and university approved multi-factor authentication. Wherever and whenever possible Privileged Access users must utilize university approved multi-factor authentication.”
This sample policy from Michigan is an example of how an organization can provision and deprovision access to systems and applications.