Mechanisms exist to ensure the risks associated with maintenance personnel who do not have appropriate access authorizations, clearances or formal access approvals are appropriately mitigated.
Mechanisms exist to ensure the risks associated with maintenance personnel who do not have appropriate access authorizations, clearances or formal access approvals are appropriately mitigated.
Mechanisms exist to ensure that non-escorted personnel performing non-IT maintenance activities in the physical proximity of IT systems have required access authorizations.
Mechanisms exist to maintain proper physical security and configuration control over technology assets awaiting service or repair.
Mechanisms exist to securely conduct field maintenance on geographically deployed assets.
Mechanisms exist to ensure off-site maintenance activities are conducted securely and the asset(s) undergoing maintenance actions are secured during physical transfer and storage while off-site.
Mechanisms exist to validate maintenance activities were appropriately performed according to the work order and that security controls are operational.
Mechanisms exist to maintain situational awareness of the quality and reliability of systems and components through tracking maintenance activities and component failure rates.
Mechanisms exist to develop, govern & update procedures to facilitate the implementation of mobile device management controls.
Mechanisms exist to enforce access control requirements for the connection of mobile devices to organizational systems.
Cryptographic mechanisms exist to protect the confidentiality and integrity of information on mobile devices through full-device or container encryption.