Data Location: Server
-
Secure destruction
—
by
Destroy devices and media that are no longer needed in a way such that no information can be recovered.
-
Data minimization
—
by
Limit the storage and collection of data at this risk level to that which is necessary to accomplish the legitimate purpose for which it is collected.
-
Don’t reuse passwords
—
by
Do not reuse passwords for multiple services. Do not use your Kerberos password for non-Kerberos enabled systems.
-
System inventory
—
by
Create and maintain an inventory of systems that includes device ownership, contact information, and network configuration.
-
Data inventory
—
by
Create and maintain an information inventory that includes classification level, information owner, and users with access.
-
Multi-factor authentication on Servers and Applications
—
by
Utilize multi-factor authentication for remote interactive user and administrator logins