Endpoint Security

Level N/A

Mechanisms exist to configure thin nodes to have minimal functionality and information storage.


Login

Endpoint Security

Mechanisms exist to physically disable or remove unnecessary connection ports or input/output devices from sensitive systems.


Login

Endpoint Security

Level N/A

Mechanisms exist to configure embedded sensors on systems to: â–ª Prohibit the remote activation of sensing capabilities; and â–ª Provide an explicit indication of sensor use to users.


Login

Endpoint Security

Level N/A

Mechanisms exist to utilize organization-defined measures so that data or information collected by sensors is only used for authorized purposes.


Login

Endpoint Security

Mechanisms exist to notify individuals that Personal Data (PD) is collected by sensors.


Login

Endpoint Security

Mechanisms exist to utilize sensors that are configured to minimize the collection of information about individuals.


Login

Embedded Technology

Mechanisms exist to verify embedded technology sensors are configured so that data collected by the sensor(s) is only reported to authorized individuals or roles.


Login

Endpoint Security

Mechanisms exist to unplug or prohibit the remote activation of collaborative computing devices with the following exceptions: â–ª Networked whiteboards; â–ª Video teleconference cameras; and â–ª Teleconference microphones.


Login

Endpoint Security

Mechanisms exist to disable or remove collaborative computing devices from critical information systems and secure work areas.


Login

Endpoint Security

Automated mechanisms exist to provide an explicit indication of current participants in online meetings and teleconferences.


Login