End users
|
-
Does the end-user training include the new functionality that Endpoint Encryption
provides?
-
Is the Acceptable Use Policy (AUP) updated to include
encryption services, especially any penalties for not
using or bypassing encryption?
-
Are users notified when they log on to the endpoint that
aligns with the AUP?
-
Are all users fully trained on how to report a lost or
stolen device?
-
Have users been trained on procedures regarding failed
login attempts and password recovery?
-
Is there a policy regarding encryption of confidential
documents that are sent outside of the
organization?
-
Have any new password policies been added to the
AUP?
|
Incident response
|
-
Has the Incident Response (IR) policy been updated to
include actions taken when a device is lost or
stolen?
-
Has an audit log review schedule been established for the
PolicyServer logs?
-
Have the email alerts been added to the IR policy,
including the recipients and the expected response when
an alert is received?
-
Have specific criteria been developed to allow a device
to be killed or wiped, including any audit trail
documentation after the action is completed?
|
Risk assessment
|
-
Has a new risk assessment been conducted to show the
change in risk profile Endpoint Encryption has
provided?
-
Have Risk Assessment procedures been updated to include
the audit data that the PolicyServer provides?
|
Disaster recovery
|
-
Has PolicyServer been added to the Critical Services
list?
-
Is the DR/BC plan updated to include the restoration of the PolicyServer service?
-
Is a process developed to allow user data to be recovered
from a device?
|
Human resources
|
-
Is the New Employee checklist updated to include any new
process for Endpoint Encryption?
-
Is the termination process updated to include Endpoint Encryption?
Consider the following:
-
Backing up, formatting, or restoring devices
-
Locking or killing devices
-
Disabling accounts in PolicyServer
|
Removeable media
|
-
What USB and other removeable media devices are allowed
in your network?
-
Will removeable media devices be accessible at all hours
of the day, or will you have set times where removeable
device authentication is not allowed?
-
Where can users access removeable media devices:
on-network, off-network, over VPN, at home?
|
Compliance
|
-
Is the compliance profile updated to include the benefits
that Endpoint Encryption
provides?
-
Has a compliance review been conducted on all aspects on
the Endpoint Encryption
implementation and deployment?
|