Skip to main content

Compute Resources

5.2 Compute Resources

  • Access Controls:

    • a. Apply Role-Based Access Control (RBAC) on cloud and on-premises systems.

    • b. Set default access permissions to the principle of least privilege.

  • c. Offer implementation of Conditional Access Policies as a consulting service based on client requirements.

Technical Controls:

Control ID Description Tools/Methods
a Apply Role-Based Access Control (RBAC) on systems. Access management platforms; Directory services (e.g., Active Directory)
b Set default access permissions to least privilege. Access control lists (ACLs); Regular access reviews
c Implement Conditional Access Policies as per client requirements. Conditional access solutions (e.g., Azure Conditional Access); Policy development frameworks

 

Standard Operating Procedures

Control IDDescriptionTools/Methods
aProvision unique identifiers for all users and devices.DTC or Client Procured Identity Management Systems (e.g., Active Directory, Azure AD)
bDeactivate user accounts after 1 year of inactivity.DTC'S RMM, Microsoft Windows PowerShell, Internet Access
cDisable local administrator accounts after 90 days of inactivity.DTC'S RMM, Microsoft Windows PowerShell, Internet Access
dDeactivate staging accounts (e.g., installadmin) after 7 days.DTC'S RMM, Microsoft Windows PowerShell, Internet Access
eRotate dtcadmin user password at system boot, user login, and weekly.DTC'S RMM, Microsoft Windows PowerShell, Internet Access
fRotate built-in Administrator password at system boot, user login, weekly.DTC'S RMM, Microsoft Windows PowerShell, Internet Access
gImplement Multi-Factor Authentication (MFA) on critical systems.Microsoft Entra ID, Google Workspace, Cloudflare ZTNA Email
hAdhere to default password policies of identity providers.Configuration of identity provider settings; Regular policy reviews
iDevelop customized password policies with clients.Consultation sessions; Policy development frameworks
j.Review and analyze audit and event logs in order to respond to security incidents.SaaS Alerts, Blumira Free Edition