DE.CM-09.289

Does your organization deploy endpoint security solutions that can detect security issues and enforce remediation before granting network access?

Explanation

This question assesses whether your organization uses endpoint security technologies that can identify security problems like missing patches, malware infections, or unauthorized software before allowing devices to access your network. These solutions, often called Network Access Control (NAC) or endpoint compliance systems, can automatically quarantine or redirect non-compliant devices to a remediation environment where issues can be fixed before granting full network access. Evidence of fulfillment could include documentation of your NAC solution configuration, screenshots of the management console showing policy enforcement rules, remediation workflows, and reports showing endpoints that were quarantined and subsequently remediated before being granted access.

Implementation Example

Use technologies with a presence on endpoints to detect cyber health issues (e.g., missing patches, malware infections, unauthorized software), and redirect the endpoints to a remediation environment before access is authorized

ID: DE.CM-09.289

Context

Function
DE: DETECT
Category
DE.CM: Continuous Monitoring
Sub-Category
Computing hardware and software, runtime environments, and their data are monitored to find potentially adverse events

ResponseHub is the product I wish I had when I was a CTO

Previously I was co-founder and CTO of Progression, a VC backed HR-tech startup used by some of the biggest names in tech.

As our sales grew, security questionnaires quickly became one of my biggest pain-points. They were confusing, hard to delegate and arrived like London busses - 3 at a time!

I'm building ResponseHub so that other teams don't have to go through this. Leave the security questionnaires to us so you can get back to closing deals, shipping product and building your team.

Signature
Neil Cameron
Founder, ResponseHub
Neil Cameron