Transcription of Cyber Essentials: Requirements for IT infrastructure
{{id}} {{{paragraph}}}
Cyber Essentials: Requirements for IT infrastructure January 2022 Crown Copyright 2022 Cyber Essentials: Requirements for IT infrastructure Contents What s new .. 3 Definitions .. 3 Scope .. 4 Overview of the scope .. 4 Bring your own device (BYOD) .. 5 Home working .. 5 Wireless devices .. 6 Externally managed services cloud .. 6 Externally managed services other .. 7 Web applications .. 7 Requirements , by technical control theme .. 7 Firewalls .. 7 Objective .. 7 Introduction .. 7 Requirements under this technical control theme .. 7 Secure configuration .. 8 Objective .. 8 Introduction .. 8 Requirements under this technical control theme .. 8 User access control .. 9 Objective .. 9 Introduction .. 9 Requirements under this technical control theme .. 10 Malware protection .. 11 Objective .. 11 Introduction .. 11 Requirements under this technical control theme.
365, Google Workspace, Mobile Device Management Containers, Citrix Desktop, Virtual ... Internet Service Provider (ISP) routers and user provided routers are out of scope which means that the Cyber Essentials firewall controls need to be applied on the user devices (e.g. a software
Domain:
Source:
Link to this page:
Please notify us if you found a problem with this document:
{{id}} {{{paragraph}}}