-|**1.5.1** Security controls are implemented on any computing devices, including company- and employee-owned devices, that connect to both untrusted networks (including the Internet) and the CDE as follows: </br> Specific configuration settings are defined to prevent threats being introduced into the entity’s network. </br> Security controls are actively running. </br> Security controls are not alterable by users of the computing devices unless specifically documented and authorized by management on a case-by-case basis for a limited period.| Use the following cloud services to allow access from compliant devices: </br> Defender for Endpoint Protection </br> Intune for Endpoint Management </br> Conditional Access </br> </br> [Common security policies for Microsoft 365 organizations](/microsoft-365/security/office-365-security/identity-access-policies?view=o365-worldwide&preserve-view=true) </br> [Zero Trust deployment plan with Microsoft 365](/microsoft-365/security/microsoft-365-zero-trust?view=o365-worldwide&preserve-view=true)|
0 commit comments