Data Location: Endpoint
-
Secure destruction
—
by
Destroy devices and media that are no longer needed in a way such that no information can be recovered.
-
Data minimization
—
by
Limit the storage and collection of data at this risk level to that which is necessary to accomplish the legitimate purpose for which it is collected.
-
Unique user accounts
—
by
Create a unique, non-privileged, account for each user. Assign a different password for user and administrative accounts.
-
System inventory
—
by
Create and maintain an inventory of systems that includes device ownership, contact information, and network configuration.
-
Data inventory
—
by
Create and maintain an information inventory that includes classification level, information owner, and users with access.