User Device Assessment

Summary

This component allows the auditor to assess the security of the individual devices on the network. This component consists of interviews, surveys, and inspection of devices.

Purpose

Compromised devices have the ability to undermine nearly any other organizational attempt at securing information. Knowing if devices receive basic software and security upgrades and what core protections against unauthorized access exist is vital to designing a strategy to make the host more secure.

The Flow Of Information

User Device Assessment Information Flow

Guiding Questions

Approaches

Outputs

Operational Security

Preparation

Baseline Skills

Resources

Password Security

Privilege Separation Across OS

  • identify what privileges services are running as
  • identify is the admin user is called admin or root
  • Identify if users are logging in and installing software as admin.

Examining Firewalls Across OS

Identifying Software Versions

Device Encryption By OS

  • Identifying if a device is using encryption by OS
  • Encryption availablility by OS
  • Encryption Guides

Anti-Virus Updates

Identifying Odd/One-Off Services

Activities

undefined


  1. APPENDIX C - Password Survey

  2. Password Security

Activities

 

Developed with ❤ by

Information Innovation Lab

Applied research and development of public interest technology.