2411.0—2411.0
>Control Description
The Supplier shall ensure the following internet controls are enforced on endpoints:
i) Technical controls to prevent malware infection from internet browsing are in place
ii) Block undesirable websites from being accessed (e.g. malicious sites, inappropriate content etc.)
iii) Prevent code being launched on the corporate host
iv) Prevent downloads to the corporate host from the internet without sandboxing and anti-malware scan
v) Automatically block suspicious traffic and communications
vi) Terminate network connections associated with communications sessions at the end of the sessions or after a defined period of inactivity.
Ensure auditing is enabled for these controls and security operators are notified of the attempted above actions. Where users have a necessity to perform the above activities, ensure a robust model and supporting processes and technologies are employed to mitigate the additional risk (e.g. allow/block listing, network monitoring, vulnerability scanning etc.)
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.