Filter

Malware Defenses

Deploy and maintain anti-malware software on all enterprise assets.


Login

Malware Defenses

Configure automatic updates for anti-malware signature files on all enterprise assets.


Login

Malware Defenses

Disable autorun and autoplay auto-execute functionality for removable media.


Login

Malware Defenses

Configure anti-malware software to automatically scan removable media.


Login

Malware Defenses

Enable anti-exploitation features on enterprise assets and software, where possible, such as Microsoft® Data Execution Prevention (DEP), Windows® Defender Exploit Guard (WDEG), or Apple® System Integrity Protection (SIP) and Gatekeeper™.


Login

Malware Defenses

Centrally manage anti-malware software.


Login

Malware Defenses

Use behavior-based anti-malware software.


Login

Data Recovery

Establish and maintain a data recovery process. In the process, address the scope of data recovery activities, recovery prioritization, and the security of backup data. Review and update documentation annually, or when significant enterprise changes occur that could impact this Safeguard.


Login

Data Recovery

Perform automated backups of in-scope enterprise assets. Run backups weekly, or more frequently, based on the sensitivity of the data.


Login

Data Recovery

Protect recovery data with equivalent controls to the original data. Reference encryption or data separation, based on requirements.


Login