Asset Management

Level N/A

Mechanisms exist to periodically inspect systems and system components for Indicators of Compromise (IoC).


Login

Asset Management

Mechanisms exist to securely dispose of, destroy or repurpose system components using organization-defined techniques and methods to prevent information being recovered from these components.


Login

Asset Management

Mechanisms exist to ensure that employees and third-party users return all organizational assets in their possession upon termination of employment, contract or agreement.


Login

Asset Management

Mechanisms exist to authorize, control and track technology assets entering and exiting organizational facilities.


Login

Asset Management

Mechanisms exist to restrict the possession and usage of personally-owned technology devices within organization-controlled facilities.


Login

Asset Management

Mechanisms exist to reduce the risk associated with third-party assets that are attached to the network from harming organizational assets or exfiltrating organizational data.


Login

Asset Management

Level N/A

Mechanisms exist to monitor and enforce usage parameters that limit the potential damage caused from the unauthorized or unintentional alteration of system parameters.


Login

Asset Management

Mechanisms exist to prevent the usage of Bluetooth and wireless devices (e.g., Near Field Communications (NFC)) in sensitive areas or unless used in a Radio Frequency (RF)-screened building.


Login

Asset Management

Mechanisms exist to prevent line of sight and reflected infrared (IR) communications use in an unsecured space.


Login

Asset Management

Level N/A

Mechanisms exist to verify logical configuration settings and the physical integrity of critical technology assets throughout their lifecycle.


Login