Skip to content

Latest commit

 

History

History
36 lines (23 loc) · 4.12 KB

03_Secure-Endpoints.md

File metadata and controls

36 lines (23 loc) · 4.12 KB

Secure Endpoints

(Back)

Objective

Implement increased levels of protection for management interfaces.

Applicable Service Models

IaaS, PaaS, SaaS

Mandatory Requirements

Activity Validation
  • Confirm that administrative access to cloud environments is from approved and trusted locations and from devices issued and managed by the GC that enforce the Endpoint Management Configuration Requirements
  • Demonstrate that access configurations and policies are implemented for devices.

Additional Considerations

Activity Validation
  • All administrative tasks should be undertaken on dedicated administrative workstations
  • Note: a dedicated administrative workstation is a secured physical (thick or thin) client workstation used to perform specific and sensitive administrative tasks or tasks requiring privileged access (such a workstation must have no Internet access and related services, such as email and web browsing, must be disabled and prohibited)
  • Confirm whether dedicated administrative workstations are used to conduct all administrative activities

References

Related security controls from ITSG-33

AC3, AC-3(7), AC-4, AC-5, AC-6, AC6(5), AC-6(10), AC-19, AC-20(3), IA-2, IA-2(1), IA-2(11), IA-4, IA-5, IA-5(1), SI-4, AU-6, AU-12