Table of Contents |
---|
Task | Tools to Identify and Classify Systems | Potentially Useful Classifications | Remediation Strategies |
---|---|---|---|
Patching |
|
|
| If not automatic, make automatic. Else:
|
Encryption |
|
|
| Primary concern: "not encrypted, but required" systems. Must make compliant. Any way to automate such systems' encryption? |
Screen Lock |
|
| Current solution: manually verify non-networked systems for screen lock compliance. |
Understanding Main Considerations
...