<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Tightening controls on end user laptops in medium size software companies in Industry News</title>
    <link>https://community.isc2.org/t5/Industry-News/Tightening-controls-on-end-user-laptops-in-medium-size-software/m-p/7571#M709</link>
    <description>&lt;P&gt;Sorry clarification when you say medium sized SaaS Company are you talking about a medium sized company with SaaS infra?(as opposed to a medium sized SaaS providoer)&lt;/P&gt;</description>
    <pubDate>Tue, 20 Feb 2018 10:26:02 GMT</pubDate>
    <dc:creator>Early_Adopter</dc:creator>
    <dc:date>2018-02-20T10:26:02Z</dc:date>
    <item>
      <title>Tightening controls on end user laptops in medium size software companies</title>
      <link>https://community.isc2.org/t5/Industry-News/Tightening-controls-on-end-user-laptops-in-medium-size-software/m-p/7557#M705</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Wanted to get some insights from this group on best practices to follow in medium size SaaS companies for end user laptop controls. Some of the controls such as disabling USBs/CD-DVD drives, restricting local administrator permissions and controlling web access (through whitelist) could add to better security posture for the organization. But these controls also come in the way of convenience and end user productivity - particularly for engineering. Instead of giving admin permission by default, it could be given on the need and on request. Some of the web access aspects could be built into the Acceptable Use Policy. Would appreciate if others could comment on what kind of practices work better as trade off between security and convenience in this aspect. Thanks in advance.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Feb 2018 21:59:40 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Tightening-controls-on-end-user-laptops-in-medium-size-software/m-p/7557#M705</guid>
      <dc:creator>2012</dc:creator>
      <dc:date>2018-02-19T21:59:40Z</dc:date>
    </item>
    <item>
      <title>Re: Tightening controls on end user laptops in medium size software companies</title>
      <link>https://community.isc2.org/t5/Industry-News/Tightening-controls-on-end-user-laptops-in-medium-size-software/m-p/7568#M707</link>
      <description>&lt;P&gt;Ensure that&amp;nbsp;Information Security policies (Acceptable use policy, Baseline policy, etc.)&amp;nbsp; state the minimal requirements to&amp;nbsp;be met by ALL systems &amp;amp;&amp;nbsp;users under the scope. In these you can&amp;nbsp;provide a section for exceptions, where you'll&amp;nbsp;list pre-defined exceptions,&amp;nbsp;&amp;amp; state that all other exceptions must&amp;nbsp;be approved by IT Security in advance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This ensures that your systems are adequately secured from the start.&amp;nbsp;Additional privileges can then be given based on&amp;nbsp;pre-defined exceptions or specific requests --- with the latter using Risk&amp;nbsp;Management.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For example, a baseline may&amp;nbsp;have all laptops set with no administrative privileges --- but your policy can make an exception for developers. If a non-developer requires administrative privileges he must submit a request (with justification), and if it's approved, must sign a Risk Acceptance form before the privileges are accorded. Of course, you'll want to have other controls to counter the risk.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Feb 2018 02:21:50 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Tightening-controls-on-end-user-laptops-in-medium-size-software/m-p/7568#M707</guid>
      <dc:creator>Shannon</dc:creator>
      <dc:date>2018-02-20T02:21:50Z</dc:date>
    </item>
    <item>
      <title>Re: Tightening controls on end user laptops in medium size software companies</title>
      <link>https://community.isc2.org/t5/Industry-News/Tightening-controls-on-end-user-laptops-in-medium-size-software/m-p/7571#M709</link>
      <description>&lt;P&gt;Sorry clarification when you say medium sized SaaS Company are you talking about a medium sized company with SaaS infra?(as opposed to a medium sized SaaS providoer)&lt;/P&gt;</description>
      <pubDate>Tue, 20 Feb 2018 10:26:02 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Tightening-controls-on-end-user-laptops-in-medium-size-software/m-p/7571#M709</guid>
      <dc:creator>Early_Adopter</dc:creator>
      <dc:date>2018-02-20T10:26:02Z</dc:date>
    </item>
    <item>
      <title>Re: Tightening controls on end user laptops in medium size software companies</title>
      <link>https://community.isc2.org/t5/Industry-News/Tightening-controls-on-end-user-laptops-in-medium-size-software/m-p/7575#M710</link>
      <description>Thank you.</description>
      <pubDate>Tue, 20 Feb 2018 14:03:52 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Tightening-controls-on-end-user-laptops-in-medium-size-software/m-p/7575#M710</guid>
      <dc:creator>2012</dc:creator>
      <dc:date>2018-02-20T14:03:52Z</dc:date>
    </item>
    <item>
      <title>Re: Tightening controls on end user laptops in medium size software companies</title>
      <link>https://community.isc2.org/t5/Industry-News/Tightening-controls-on-end-user-laptops-in-medium-size-software/m-p/7576#M711</link>
      <description>Medium sized SaaS provider.</description>
      <pubDate>Tue, 20 Feb 2018 14:04:28 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Tightening-controls-on-end-user-laptops-in-medium-size-software/m-p/7576#M711</guid>
      <dc:creator>2012</dc:creator>
      <dc:date>2018-02-20T14:04:28Z</dc:date>
    </item>
    <item>
      <title>Re: Tightening controls on end user laptops in medium size software companies</title>
      <link>https://community.isc2.org/t5/Industry-News/Tightening-controls-on-end-user-laptops-in-medium-size-software/m-p/7583#M714</link>
      <description>&lt;P&gt;OK so, as a SaaS I guess you will want most things to be driven from the cloud? I'll add a grab back of things for vendors.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So basics wise patching is pretty much essential if you do nothing else.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.automox.com/pricing" target="_blank"&gt;https://www.automox.com/pricing&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Privileged user management it nice as well:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.centrify.com/products/endpoint-services/" target="_self"&gt;https://www.centrify.com/products/endpoint-services/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.beyondtrust.com" target="_self"&gt;https://www.beyondtrust.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You'd&amp;nbsp;want to have some endpoint security and malware:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.symantec.com/products/endpoint-protection-cloud" target="_self"&gt;https://www.symantec.com/products/endpoint-protection-cloud&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.sophos.com/en-us.aspx" target="_self"&gt;https://www.sophos.com/en-us.aspx&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Try to protect against email and the web:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.symantec.com/products/messaging-security" target="_self"&gt;https://www.symantec.com/products/messaging-security&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.symantec.com/products/secure-web-gateway-proxy-sg-and-asg" target="_self"&gt;https://www.symantec.com/products/secure-web-gateway-proxy-sg-and-asg&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.mimecast.com" target="_self"&gt;https://www.mimecast.com&lt;/A&gt;&lt;A href="https://www.cisco.com/c/en/us/support/security/cloud-email-security/tsd-products-support-series-home.html" target="_self"&gt;https://www.cisco.com/c/en/us/support/security/cloud-email-security/tsd-products-support-series-home.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Isolation, DLP, Encryption, jump boxeds etc all add to the possibilities - if the Priveledged Users need to be admains on the end user system then probably use MFA and jump boxes to mediate system access and record what the users do. All of these controls can help - question is how do you prioritize or design them to work together?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Write it all down for the auditor and repeat as required for SOC2 and whatever else you need to deal with...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Feb 2018 06:35:18 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Tightening-controls-on-end-user-laptops-in-medium-size-software/m-p/7583#M714</guid>
      <dc:creator>Early_Adopter</dc:creator>
      <dc:date>2018-02-21T06:35:18Z</dc:date>
    </item>
    <item>
      <title>Re: Tightening controls on end user laptops in medium size software companies</title>
      <link>https://community.isc2.org/t5/Industry-News/Tightening-controls-on-end-user-laptops-in-medium-size-software/m-p/7585#M715</link>
      <description>&lt;P&gt;Thank you. We have been a Soc 2 compliant org for the past 4 years. Just that in a few areas we are trying to improve which are traditionally moot - such as local admin permissions on end users' laptops, unlimited access to web, permissive controls on the use of USB/DVD drives ..etc. I was wondering what other SaaS companies have been doing with these controls balancing security and convenience/productivity and hence my question.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Kanda&lt;/P&gt;</description>
      <pubDate>Wed, 21 Feb 2018 06:49:00 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Tightening-controls-on-end-user-laptops-in-medium-size-software/m-p/7585#M715</guid>
      <dc:creator>2012</dc:creator>
      <dc:date>2018-02-21T06:49:00Z</dc:date>
    </item>
    <item>
      <title>Re: Tightening controls on end user laptops in medium size software companies</title>
      <link>https://community.isc2.org/t5/Industry-News/Tightening-controls-on-end-user-laptops-in-medium-size-software/m-p/35810#M4514</link>
      <description>&lt;P&gt;Hi There,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I was actually going through end user security requirement ISC and found this thread. Well, I have few thoughts in my mind, and looking for more;&lt;/P&gt;&lt;P&gt;1) While we talk about end user security, both windows and MAC based machines should be factored. Any organization having a mix of such end user machines and covering only half of it defeats purpose.&lt;/P&gt;&lt;P&gt;2) While restrictions on local admin, usb is common these days, i was of the view that file transfer via bluetooth also should be blocked. i have seen few smart users stealing data via bluetooth&lt;/P&gt;&lt;P&gt;3) Regular patch / and antivirus update is no brainer this has to be done&lt;/P&gt;&lt;P&gt;4) I have a strong feeling that logs of end user should be reviewed on periodic basis to see some suspicious activity&amp;nbsp;&lt;/P&gt;&lt;P&gt;5) End user security also consist of user data, how and where they are being backed up&lt;/P&gt;</description>
      <pubDate>Wed, 20 May 2020 10:09:48 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Tightening-controls-on-end-user-laptops-in-medium-size-software/m-p/35810#M4514</guid>
      <dc:creator>urvishacharya</dc:creator>
      <dc:date>2020-05-20T10:09:48Z</dc:date>
    </item>
  </channel>
</rss>

