https://www.tripwire.com/state-of-security/usb-threats-cybersecurity-industrial
This article provides an overview of the risks associated with removable media for industrial facilities based on a 2018 Honeywell report.
University of California Berkeley – Securing Remote Desktop (RDP) for System Administrators
3.1 3.1.13
https://security.berkeley.edu/education-awareness/securing-remote-desktop-rdp-system-administrators
This page from The UC Berkeley Information Security Office offers basic tips to system administrators for securing Windows Remote Desktop.
University of California San Francisco – Wireless RF Design Guideline
3.1 3.1.16 3.1.17 Access Control
https://it.ucsf.edu/standard-guideline/ucsf-rf-design-guideline
This example policy from UCSF describes their organized approach in deploying wireless technologies on the enterprise network.
University of California Santa Cruz – Protecting Electronic Restricted Data
3.1 3.1.22 Access Control
https://its.ucsc.edu/policies/rdpp.html
This example IT practices document from UC Santa Cruz lays out practices for protecting restricted data.
University of Cincinnati – Privileged Access Policy
3.1 3.1.15 Access Control
https://www.uc.edu/content/dam/uc/infosec/docs/policies/Privileged_Access_Policy_9.1.14.pdf
The policy provides a background of who is granted privileged access. On page 2, the policy indicates that “If access is required when off-campus, then the user must use the university’s VPN and university approved multi-factor authentication. Wherever and whenever possible Privileged Access users must utilize university approved multi-factor authentication.”
University of Michigan – Access, Authorization, and Authentication Management
3.1 3.1.1 3.1.2 Access Control
https://it.umich.edu/information-technology-policies/general-policies/DS-22
This sample policy from Michigan is an example of how an organization can provision and deprovision access to systems and applications.
https://www.cisa.gov/sites/default/files/publications/RisksOfPortableDevices.pdf
This paper focuses on the risks associated with simple media devices and smart media devices.
https://www.youtube.com/watch?v=Gi-niOoVAm4
This video from SANS educates viewers on the positive and negative aspects of using full disk encryption for security.
YouTube – Verify and control/limit connections to and use of external systems
3.1 3.1.20 Access Control
https://www.youtube.com/watch?v=W-8pcvpW4II
In this edition of the On Call Compliance Solutions Compliance Tip of the Week, we discuss how organizations must establish terms and conditions for the use of external systems in accordance with organizational security policies and procedures. Those terms and conditions must address as a minimum, the types of applications that can be accessed on organizational systems from external systems.
https://www.youtube.com/watch?v=rIzTgaMhovg
This provides an outline to wireless security, including: Wireless Threats, Security Methods, Encryption, & Authentication.