DE.CM-09.289
Does your organization deploy endpoint security solutions that can detect security issues and enforce remediation before granting network access?
Explanation
This question assesses whether your organization uses endpoint security technologies that can identify security problems like missing patches, malware infections, or unauthorized software before allowing devices to access your network. These solutions, often called Network Access Control (NAC) or endpoint compliance systems, can automatically quarantine or redirect non-compliant devices to a remediation environment where issues can be fixed before granting full network access. Evidence of fulfillment could include documentation of your NAC solution configuration, screenshots of the management console showing policy enforcement rules, remediation workflows, and reports showing endpoints that were quarantined and subsequently remediated before being granted access.
Implementation Example
Use technologies with a presence on endpoints to detect cyber health issues (e.g., missing patches, malware infections, unauthorized software), and redirect the endpoints to a remediation environment before access is authorized
ID: DE.CM-09.289
Context
- Function
- DE: DETECT
- Category
- DE.CM: Continuous Monitoring
- Sub-Category
- Computing hardware and software, runtime environments, and their data are monitored to find potentially adverse events

