3.13.5 Sub-Networks Publicly Accessible System Components Guides SANS Institute – Designing a DMZ NIST SP 800-41 – Guidelines on Firewalls and Firewall Policy Microsoft TechNet –...
3.13.7 Prevent Simultaneous Remote Connections from Devices Guides NIST SP 800-77 – Guide to IPSec VPNs NIST SP 800-46 – Guide to Enterprise Telework, Remote Access, and...
3.13.8 Implement Cryptographic Mechanisms Prevent Unauthorized CUI Guides Accellion Administrators Guide Sample Policy & Procedures Accellion Cryptographic Module Security Policy Vendor Documentation Accellion Security Breach FAQs
3.13.12 Prohibit Remote Activation of Collaborative Computing Devices Guides Avaya User Guide Cisco Unified Videoconferencing User Guide Example Tools Avaya Sample Policy & Procedures NIST 800-53 SC-7
3.13.15 Protect Authenticity of Communication Sessions Guides NIST SP 800-52 Rev1 – Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations NIST...
3.14.1 Report Information & System Flaws Guides NIST SP 800-40 – Guide to Enterprise Patch Management Technologies SANS Institute – A Practical Methodology for Implementing a...
3.14.2 Protect Against Malicious Code Guides NIST SP 800-83 Guide to Malware Incident Prevention & Handling for Desktops & Laptops SANS Institute – Enterprise Survival...
3.14.5 Periodic Scans of Information System Guides McAfee Virus Scan Best Practices Example Tools McAfee Virus Scan Broadcom – Endpoint Protection Vendor Documentation McAfee Virus Scan...