Skip to content

Latest commit

 

History

History
182 lines (131 loc) · 12.8 KB

bronze-controls.md

File metadata and controls

182 lines (131 loc) · 12.8 KB
title description published date tags editor dateCreated
Procedures, Controls & Guides
true
2021-08-10 15:07:29 UTC
bronze, home, bronze-controls
markdown
2021-03-02 03:57:32 UTC

Business/Organization Management

Implementing processs for sticking to strategic direction, managing risks, and verifying that your systems work as designed today and will work as expected during an incident. {.is-success}

Data Management

Practices for classifying, managing, and storing your information/data electonically. {.is-success}

Identity and Access Management

Technologies for ensuring that the proper people in an enterprise have the appropriate access to technology resources. {.is-success}

E-Mail Security

Technologies for ensuring that the proper people in an enterprise have the appropriate access to technology resources. {.is-success}

E-Mail Anti-Spoofing & Trust Collection

Device Management

Device management is the process of managing the implementation, operation and maintenance of a physical and/or virtual device. It is a broad term that includes various administrative tools and processes for the maintenance and upkeep of a computing, network, mobile and/or virtual device. Majority of this section emphasizes Mobile Device Management, which is an industry accepted term for nearly all End-User Devices. While historically worksations and desktops were treated differently from phones and tables, the convergence of these technologies has made them ubquitious. BCSF assumes that all end-user devices are mobile devices whether they are a workstation, desktop, laptop, phone, tablet, or thin-client.

Mobile Device Guidance

Securing mobile devices is an essential part of guarding your organization against a variety of threats, many of which herald from the internet. You can also begin with our forward for Mobile Device Guidance. {.is-success}

Getting Ready

Before you start deploying and configuring mobile devices, there are a few important decisions you need to make. This includes which devices to buy, how to buy them, and how to get them into the hands of your users, securely.

The choices you make at this stage of your deployment can have a huge impact on the resulting security of your networks, so it’s important to get them right. The guides in this section will walk you through these key decisions, highlighting the security issues at stake and suggesting 'best practice' solutions where possible. {.is-info}

Policies and Settings

Once you’ve chosen which devices your staff will use and decided how they should use them, you’ll need to start thinking about how to configure these devices and the services on them. Ideally, there will be a combination of settings and controls which makes it easy for your users to get their jobs done but makes it hard for attackers to compromise your systems. {.is-info}

Managing Deployed Devices

Even once your devices are in the hands of your users, there is still more work to do. In particular, you’ll want to make sure your deployment remains secure. {.is-info}

Infrastructure

Any deployment of mobile devices will be built upon a network of supporting infrastructure. This section includes our guidance on how to develop, manage, and secure the systems which underpin your mobile devices. {.is-info}

Device Management Operations

Securing Devices

Resetting Devices

Network Management

Network management is the process of administering and managing computer networks. Services provided by this discipline include fault analysis, performance management, provisioning of networks and maintaining quality of service. {.is-success}

Systems Monitoring

System monitoring is essentially about checking the operation of devices and applications across the IT infrastructure, including measuring traffic and activity between different network components. It can also include catching discrete occurrences or patterns within event logs signaling errors or security issues. {.is-success}

Vulnerability Management

Vulnerability management is the "cyclical practice of identifying, classifying, prioritizing, remediating, and mitigating" software vulnerabilities. Vulnerability management is integral to computer security and network security {.is-success}

Software as a Service (SaaS)

Guidance for organizations looking to use, deploy, and understand the risks of adopting a range of popular Software as a Service (SaaS) applications. {.is-success}