Skip to main content

๐Ÿ’ผ 2 Secure configuration

  • Contextual name: ๐Ÿ’ผ 2 Secure configuration
  • ID: /frameworks/uk-cyber-essentials-v3.1/02
  • Located in: ๐Ÿ’ผ UK Cyber Essentials

Descriptionโ€‹

Empty...

Similarโ€‹

  • Internal
    • ID: dec-b-ed953434

Sub Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlags
๐Ÿ’ผ 2.1 Computers and network devices6
ย ย ย ย ๐Ÿ’ผ 2.1.1 Remove and disable unnecessary user accounts
ย ย ย ย ๐Ÿ’ผ 2.1.2 Change any default or guessable account passwords23
ย ย ย ย ๐Ÿ’ผ 2.1.3 Remove or disable unnecessary software
ย ย ย ย ๐Ÿ’ผ 2.1.4 Disable any auto-run feature which allows file execution without user authorization
ย ย ย ย ๐Ÿ’ผ 2.1.5 Ensure users are authenticated before allowing them access to organizational data or services33
ย ย ย ย ๐Ÿ’ผ 2.1.6 Ensure appropriate device locking controls for users that are physically present
๐Ÿ’ผ 2.2 Device unlocking credentials3
ย ย ย ย ๐Ÿ’ผ 2.2.1 A credential such as a biometric, password or PIN must be in place before a user can gain access to the services.
ย ย ย ย ๐Ÿ’ผ 2.2.2 You must protect your chosen authentication method against brute-force attacks2
ย ย ย ย ย ย ย ย ๐Ÿ’ผ 2.2.2.1 Shouldnโ€™t allow more than 10 guesses in 5 minutes
ย ย ย ย ย ย ย ย ๐Ÿ’ผ 2.2.2.2 Lock devices after more than 10 unsuccessful attempts.
ย ย ย ย ๐Ÿ’ผ 2.2.3 Technical controls must be used to manage the quality of credentials.