Endpoint Security
SB.7.006 Public workspace security
Shared workspace endpoints are physically protected from tampering with or removing the hardware.
Lees meerSB.7.005 Screen lock
When a workstation is left unattended, the session/screen is locked automatically after a maximum of 15 minutes and the user prompted for re-authentication.
Lees meerSB.7.004 Memory protection
Endpoints have appropriate protections to prevent attacks on memory.
Lees meerSB.7.003 Local privileged accounts
Regular end-users do not have privileged access to endpoints continuously, including but not limited to the ability to modify organisationally managed system settings, changes to environment variables, directly modify the registry, modify files in system directories or install programs. Only users that have a demonstrable need for a local privileged account to perform their work activities can have access to a local privileged account. This access adheres to the privileged access controls, including just-in-time and just-enough admin. These privileges are registered together with the reason why and the approver.
Lees meerSB.7.002 Anti-Malware protection
Preventive, detective and corrective measures are in place (especially up-to-date security patches and virus control) across the organisation to protect information systems and technology from malware (e.g., viruses, worms, spyware, spam).
Lees meerSB.7.001 Scripts and Executables
Unless necessary for executing job responsibilities, by default user endpoints do not allow the execution of scripts and executables. If the function necessitates this access, it will be documented and approved by the supervisor.
Lees meer