Trial lock

This Research is for Members Only

Not a member? Unlock a free sample of our research now!

Already a member?

Sign in now

This Systems Configuration Policy applies to all information systems and information system components of the organization. Specifically, it includes:

  • Mainframes, servers, and other devices that provide centralized computing capabilities.
  • SAN, NAS, and other devices that provide centralized storage capabilities.
  • Desktops, laptops, and other devices that provide distributed computing capabilities.
  • Routers, switches, and other devices that provide network capabilities.
  • Firewalls, IDP sensors, and other devices that provide dedicated security capabilities.

Also In

Identify the Best Framework for Your Security Policies

Leverage policies based on NIST, ISO, or other procedural-based documents.

Related Content

Hide Details

Search Code: 85526
Published: April 10, 2018
Last Revised: April 12, 2018

Social

Get Access

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.