4 — Secure Configuration of Enterprise Assets and Software
12 safeguards in the Secure Configuration of Enterprise Assets and Software control
4.1Establish and Maintain a Secure Configuration Process
4.2Establish and Maintain a Secure Configuration Process for Network Infrastructure
4.3Configure Automatic Session Locking on Enterprise Assets
4.4Implement and Manage a Firewall on Servers
4.5Implement and Manage a Firewall on End-User Devices
4.6Securely Manage Enterprise Assets and Software
4.7Manage Default Accounts on Enterprise Assets and Software
4.8Uninstall or Disable Unnecessary Services on Enterprise Assets and Software
4.9Configure Trusted DNS Servers on Enterprise Assets
4.10Enforce Automatic Device Lockout on Portable End-User Devices
4.11Enforce Remote Wipe Capability on Portable End-User Devices
4.12Separate Enterprise Workspaces on Mobile End-User Devices