Description
On a per-device basis, this Pillar most commonly addresses company needs around:
Endpoint and Network Security
- Managing Antivirus Solutions: Ensuring all endpoints have up-to-date threat protection.
- Managing Firewall Rules: Configuring firewalls to block unauthorized traffic.
- Securing Wi-Fi and VPN: Configuring secure remote access for employees.
- Vulnerability Scans: Scanning systems for security vulnerabilities and applying patches.
Incident Response
- Investigating and Responding to Security Incidents: Analyzing alerts and logs for signs of cyberattacks or breaches and responding appropriately.
- Monitoring Security Logs and Alerts: Reviewing logs from security tools and firewalls.
Data Protection and Compliance
- Managing Data Encryption: Encrypting sensitive business data in transit and at rest.
- Ensuring Compliance with Industry Regulations (e.g., HIPAA, PCI-DSS, GDPR): Implementing policies and software to meet security and privacy requirements.
- Device Hardening: Applying security policies to company-owned assets.
General Security Administration
- Security Audits: Regularly evaluating the security posture of the organization.
- Developing and Enforcing IT Security Policies: Creating policies for acceptable use, data protection, and security best practices.



