The organization utilizes the principle of least functionality in deploying and configuring systems. Systems must not have rights to anything that is not needed to accomplish what they are intended for.
See an example process description from task's page
Connected other frameworks and requirements:
PR.PT-3: Principle of least functionality
9.3 (MIL2): Implement IT and OT Asset Security as an Element of the Cybersecurity Architecture
No items found.
Stay up-to-date on cyber security
Subscribe for our free, weekly newsletter
Get a weekly digest with most important cybersec news, new Academy content and next week's free webinars.
Kiitos! Saat vielä vahvistuksen sähköpostiisi.
Valitettavasti tietojasi ei voitu lähettää eteenpäin.
* Your email won't be sold nor disclosed forward. Confirmation has more info. Learn more