The University of Tennessee – System/Network Login Banners 3.1 3.1.9
This link from the Information Security Department at the University of Tennessee provides an example login banner that could be used for other organizations.
This link from the Information Security Department at the University of Tennessee provides an example login banner that could be used for other organizations.
This post provides information as well as a downloadable worksheet that organizations can use to plan and demonstrate separation of duties.
This article provides an overview of the risks associated with removable media for industrial facilities based on a 2018 Honeywell report.
This page from The UC Berkeley Information Security Office offers basic tips to system administrators for securing Windows Remote Desktop.
This example policy from UCSF describes their organized approach in deploying wireless technologies on the enterprise network.
This example IT practices document from UC Santa Cruz lays out practices for protecting restricted data.
The policy provides a background of who is granted privileged access. On page 2, the policy indicates that “If access is required when off-campus, then the user must use the university’s VPN and university approved multi-factor authentication. Wherever and whenever possible Privileged Access users must utilize university approved multi-factor authentication.”
This sample policy from Michigan is an example of how an organization can provision and deprovision access to systems and applications.
This paper focuses on the risks associated with simple media devices and smart media devices.
This video from SANS educates viewers on the positive and negative aspects of using full disk encryption for security.