Network Monitoring and Defense

Manage access control for assets remotely connecting to enterprise resources. Determine amount of access to enterprise resources based on: up-to-date anti-malware software installed, configuration compliance with the enterprise’s secure configuration process, and ensuring the operating system and applications are up-to-date.


Login

Network Monitoring and Defense

Collect network traffic flow logs and/or network traffic to review and alert upon from network devices.


Login

Network Monitoring and Defense

Deploy a host-based intrusion prevention solution on enterprise assets, where appropriate and/or supported. Example implementations include use of an Endpoint Detection and Response (EDR) client or host-based IPS agent.


Login

Network Monitoring and Defense

Deploy a network intrusion prevention solution, where appropriate. Example implementations include the use of a Network Intrusion Prevention System (NIPS) or equivalent CSP service.


Login

Network Monitoring and Defense

Deploy port-level access control. Port-level access control utilizes 802.1x, or similar network access control protocols, such as certificates, and may incorporate user and/or device authentication.


Login

Security Awareness and Skills Training

Establish and maintain a security awareness program. The purpose of a security awareness program is to educate the enterprise’s workforce on how to interact with enterprise assets and data in a secure manner. Conduct training at hire and, at a minimum, annually. Review and update content annually, or when significant enterprise changes occur that could impact this Safeguard.


Login

Security Awareness and Skills Training

Train workforce members to recognize social engineering attacks, such as phishing, pre-texting, and tailgating. 


Login

Security Awareness and Skills Training

Train workforce members on authentication best practices. Example topics include MFA, password composition, and credential management.


Login

Security Awareness and Skills Training

Train workforce members on how to identify and properly store, transfer, archive, and destroy sensitive data. This also includes training workforce members on clear screen and desk best practices, such as locking their screen when they step away from their enterprise asset, erasing physical and virtual whiteboards at the end of meetings, and storing data and assets securely.


Login

Security Awareness and Skills Training

Train workforce members to be aware of causes for unintentional data exposure. Example topics include mis-delivery of sensitive data, losing a portable end-user device, or publishing data to unintended audiences.


Login