End users
|
Does the end-user training include the new functionality that Endpoint Encryption
provides?
Is the Acceptable Use Policy (AUP) updated to include
encryption services, especially any penalties for not
using or bypassing encryption?
Are users notified when they log on to the endpoint that
aligns with the AUP?
Are all users fully trained on how to report a lost or
stolen device?
Have users been trained on procedures regarding failed
login attempts and password recovery?
Is there a policy regarding encryption of confidential
documents that are sent outside of the
organization?
Have any new password policies been added to the
AUP?
|
Incident response
|
Has the Incident Response (IR) policy been updated to
include actions taken when a device is lost or
stolen?
Has an audit log review schedule been established for the
PolicyServer logs?
Have the email alerts been added to the IR policy,
including the recipients and the expected response when
an alert is received?
Have specific criteria been developed to allow a device
to be killed or wiped, including any audit trail
documentation after the action is completed?
|
Risk assessment
|
Has a new risk assessment been conducted to show the
change in risk profile Endpoint Encryption has
provided?
Have Risk Assessment procedures been updated to include
the audit data that the PolicyServer provides?
|
Disaster recovery
|
Has PolicyServer been added to the Critical Services
list?
Is the DR/BC plan updated to include the restoration of the PolicyServer service?
Is a process developed to allow user data to be recovered
from a device?
|
Human resources
|
Is the New Employee checklist updated to include any new
process for Endpoint Encryption?
Is the termination process updated to include Endpoint Encryption?
Consider the following:
-
Backing up, formatting, or restoring devices
-
Locking or killing devices
-
Disabling accounts in PolicyServer
|
Removeable media
|
-
What USB and other removeable media devices are allowed
in your network?
-
Will removeable media devices be accessible at all hours
of the day, or will you have set times where removeable
device authentication is not allowed?
-
Where can users access removeable media devices:
on-network, off-network, over VPN, at home?
|
Compliance
|
Is the compliance profile updated to include the benefits
that Endpoint Encryption
provides?
Has a compliance review been conducted on all aspects on
the Endpoint Encryption
implementation and deployment?
|