Designing Access Controls
Finalize Security Policies
1.Does your organization require
In Table
2.Does your organization require
3.Does your organization require personal firewalls?
Fill in the solutions that meet your requirements in the “Personal fire- walls” cell (for vendor and Windows firewalls). If you require the Mac firewall on Mac endpoints, check the “Mac firewall” cell.
Table 3-96. Tests for Medium Endpoint Integrity
|
| Personal Firewalls | Mac Firewall |
|
|
|
|
Solutions that meet requirements
More Rigorous Tests for Endpoint Integrity. You might want to test end- points in particularly high security zones more rigorously. These tests might:
■Verify that endpoints are protected from
■Minimize risky or undesirable applications and behavior
■Check that not just the endpoints’ OS but also various applications are patched
■Verify that endpoints remain patched
Some of these tests might scan not only for insecure settings and applications, but also for settings and applications
These tests in this section might start to interfere with the way those who connect to the network can use the network. Hopefully, users will begin to employ their network access in safer and more productive ways. However, you do not want to hinder legitimate use; as recommended in Chapter 2: