Mechanisms exist to periodically inspect systems and system components for Indicators of Compromise (IoC).
Mechanisms exist to periodically inspect systems and system components for Indicators of Compromise (IoC).
Mechanisms exist to securely dispose of, destroy or repurpose system components using organization-defined techniques and methods to prevent information being recovered from these components.
Mechanisms exist to ensure that employees and third-party users return all organizational assets in their possession upon termination of employment, contract or agreement.
Mechanisms exist to authorize, control and track technology assets entering and exiting organizational facilities.
Mechanisms exist to restrict the possession and usage of personally-owned technology devices within organization-controlled facilities.
Mechanisms exist to reduce the risk associated with third-party assets that are attached to the network from harming organizational assets or exfiltrating organizational data.
Mechanisms exist to monitor and enforce usage parameters that limit the potential damage caused from the unauthorized or unintentional alteration of system parameters.
Mechanisms exist to prevent the usage of Bluetooth and wireless devices (e.g., Near Field Communications (NFC)) in sensitive areas or unless used in a Radio Frequency (RF)-screened building.
Mechanisms exist to prevent line of sight and reflected infrared (IR) communications use in an unsecured space.
Mechanisms exist to verify logical configuration settings and the physical integrity of critical technology assets throughout their lifecycle.