|
43 | 43 | description: Do you have procedures for provisioning devices according to security requirements |
44 | 44 | and verifying ongoing compliance? |
45 | 45 | title: Device Provisioning and Compliance |
46 | | - - id: ws-2.1.3 |
47 | | - description: Do you maintain procedures for device procurement through verified supply chains |
48 | | - and verification of device integrity upon receipt? |
49 | | - title: Device Supply Chain Security |
50 | 46 | - id: ws-2.2.1 |
51 | 47 | description: Do you enforce authentication requirements for device access (password complexity, |
52 | 48 | timeout settings, lock screens)? |
@@ -74,18 +70,10 @@ cert: |
74 | 70 | description: Do you maintain endpoint detection and response (EDR) or mobile device management |
75 | 71 | (MDM) solutions on organizational devices with documented deployment and monitoring procedures? |
76 | 72 | title: EDR/MDM Deployment and Monitoring |
77 | | - - id: ws-2.5.2 |
| 73 | + - id: ws-2.5.1 |
78 | 74 | description: Do you have procedures for responding to EDR/MDM alerts and enforcing compliance |
79 | 75 | with security policies through these platforms? |
80 | 76 | title: EDR/MDM Alert Response Procedures |
81 | | - - id: ws-2.6.1 |
82 | | - description: Do you maintain policies for browser and application security (browser isolation, |
83 | | - extension approval, external file handling)? |
84 | | - title: Browser and Application Security |
85 | | - - id: ws-2.7.1 |
86 | | - description: Do you maintain requirements for physical workspace security for both on-site |
87 | | - and remote work environments? |
88 | | - title: Physical Workspace Security |
89 | 77 | - id: ws-3 |
90 | 78 | title: Account Management & Access Control |
91 | 79 | controls: |
@@ -113,10 +101,6 @@ cert: |
113 | 101 | description: Do you have procedures for verifying ownership and preventing unauthorized |
114 | 102 | use of organizational external accounts? |
115 | 103 | title: Ownership Verification for External Accounts |
116 | | - - id: ws-3.3.3 |
117 | | - description: Do you maintain policies for account security controls (recovery method restrictions, |
118 | | - organizational identity verification)? |
119 | | - title: Account Security Controls |
120 | 104 | - id: ws-3.4.1 |
121 | 105 | description: Do you maintain security procedures for domain registration and DNS management |
122 | 106 | (registrar lock, change controls)? |
@@ -144,10 +128,6 @@ cert: |
144 | 128 | description: Do you have enhanced controls for high-privilege credentials (admin accounts, |
145 | 129 | service accounts, API keys)? |
146 | 130 | title: Enhanced Controls for High-Privilege Credentials |
147 | | - - id: ws-4.2.3 |
148 | | - description: Do you maintain policies prohibiting credential sharing and requiring individual |
149 | | - accounts for accountability? |
150 | | - title: Account Sharing Prohibition |
151 | 131 | - id: ws-5 |
152 | 132 | title: Development Environment Security |
153 | 133 | controls: |
@@ -213,31 +193,16 @@ cert: |
213 | 193 | with regular updates? |
214 | 194 | title: Workspace Security Awareness Program Updates |
215 | 195 | - id: ws-8.1.4 |
216 | | - description: Do you conduct regular phishing simulations and social engineering awareness |
217 | | - exercises with follow-up training for personnel who fail? |
218 | | - title: Phishing and Social Engineering Testing |
219 | | - - id: ws-8.1.5 |
220 | 196 | description: Do you maintain comprehensive offboarding procedures including access revocation, |
221 | 197 | device return, and credential rotation? |
222 | 198 | title: 'Offboarding Procedures: Access Revocation and Return' |
223 | | - - id: ws-8.1.6 |
| 199 | + - id: ws-8.1.5 |
224 | 200 | description: Do you maintain procedures for adjusting access rights when employees change |
225 | 201 | roles? |
226 | 202 | title: Adjusting Access Rights on Role Change |
227 | | - - id: ws-8.1.7 |
| 203 | + - id: ws-8.1.6 |
228 | 204 | description: Do you conduct periodic reviews to identify and remove unnecessary access permissions? |
229 | 205 | title: Periodic Review of Access Permissions |
230 | | -- id: ws-9 |
231 | | - title: Insider Threat & Third-Party Access |
232 | | - controls: |
233 | | - - id: ws-9.1.1 |
234 | | - description: Do you conduct insider threat assessments to identify potential damage scenarios |
235 | | - and ensure access is minimized for each role? |
236 | | - title: Insider Threat Assessment |
237 | | - - id: ws-9.1.2 |
238 | | - description: Do you maintain procedures for managing third-party access (time-limits, |
239 | | - purpose-specific permissions, audit trails)? |
240 | | - title: Third-Party Access Management |
241 | 206 |
|
242 | 207 | --- |
243 | 208 |
|
|
0 commit comments