Texas A&M IT Policy – Access Control – Publicly Accessible Content 3.1 3.1.22 Access Control
This is an example of a policy that fulfills AC.1.1004 Control information posted or processed on publicly accessible information systems.
This is an example of a policy that fulfills AC.1.1004 Control information posted or processed on publicly accessible information systems.
This article provides companies with ideas on how to mitigate the risk that mobiles carry with them as attackers turn to target them.
This post provides information as well as a downloadable worksheet that organizations can use to plan and demonstrate separation of duties.
This article provides an overview of the risks associated with removable media for industrial facilities based on a 2018 Honeywell report.
This example policy from UCSF describes their organized approach in deploying wireless technologies on the enterprise network.
This example IT practices document from UC Santa Cruz lays out practices for protecting restricted data.
The policy provides a background of who is granted privileged access. On page 2, the policy indicates that “If access is required when off-campus, then the user must use the university’s VPN and university approved multi-factor authentication. Wherever and whenever possible Privileged Access users must utilize university approved multi-factor authentication.”
This sample policy from Michigan is an example of how an organization can provision and deprovision access to systems and applications.
This paper focuses on the risks associated with simple media devices and smart media devices.
This video from SANS educates viewers on the positive and negative aspects of using full disk encryption for security.