2.6 Configure a Workstation to Meet Best Practices for Security Flashcards
Data-at-rest encryption
Full disk encryption or individual data
Password Best Practices Complexity Requirements - Length
At least 8 characters or longer
Password Best Practices Complexity Requirements - Character Types
Special characters
Password Best Practices Complexity Requirements - Expiration Requirements
Around 30, 60, or 90 days to reset password
Password Best Practices Complexity Requirements - Basic input/output system (BIOS)/Unified Extensible Firmware Interface (UEFI) passwords
Admin password for BIOS changes, user password to prevent booting up
End-User Best Practices - Use screensaver locks
Automatically lock screen with time duration
End-User Best Practices - Log off when not in use
Automatically log off with time duration
End-User Best Practices -Secure personally identifiable information (PII) and passwords
Personal data, be on the lookout for others looking at the screen
Account Management - Restrict user permissions
Assign specific rights and permissions to specific users
Account Management - Restrict login times
Restrict log in during certain times
Account Management - Disable guest account
Disable any unnecessary accounts from logging in
Account Management - Use failed attempts lockout
Number of chances before locking the ability to log in
Disable AutoRun
Feature that allows file to auto run from a removable drive (big security concern)
Disable AutoPlay
Feature that allows file to auto run from a removable drive (big security concern)