My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
2025-05-27-minutes-it-study-session
>
Meetings
>
2025
>
10. October
>
2025-10-07 10:00 AM - Commissioners' Agenda
>
2025-05-27-minutes-it-study-session
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
10/2/2025 3:46:32 PM
Creation date
10/2/2025 3:44:53 PM
Metadata
Fields
Template:
Meeting
Date
10/7/2025
Meeting title
Commissioners' Agenda
Location
Commissioners' Auditorium
Address
205 West 5th Room 109 - Ellensburg
Meeting type
Regular
Meeting document type
Supporting documentation
Supplemental fields
Item
Approve Minutes
Order
1
Placement
Consent Agenda
Row ID
136417
Type
Minutes
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
90
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
<br />©2025 Lumifi Cyber, Inc. All rights reserved. <br />PRIVATE - Controlled by Lumifi Cyber <br /> <br />18/25 <br />PRIVATE - Controlled by Lumifi Cyber <br />• Describe IT and IS policies that apply to your work <br />• Describe desktop and server build and management practices and <br />technologies as well as laptop/mobile workstation build and <br />management practices and technologies <br />• Secure configuration baseline from CIS, NIST, MSFT? <br />• Do you use Shared Accounts such as the Local Administrative Password <br />or Root Account? <br />• Is the Windows Firewall up by default or controlled by the network <br />profile? <br />• What Antivirus is used and how are alerts, missed signature updates and <br />missed software updates alerted and resolved? <br />• Is full disk encryption, such as BitLocker, in use and are Additional <br />Decryption Keys managed by IT? <br />• Describe your AD/LDAP management practices? <br />• Is Role-Based Access Control (RBAC) used for access in <br />applications? Are AD groups used to provide Role -Based Access Control <br />(RBAC) for users access to systems, file shares or applications? How <br />about machines being restricted to what other machines they can access <br />using AG groups? <br />• Are AD Domain Admin and other highly privileged accounts provided <br />limited to only those needing that level of access to do their job? <br />• Do users have local administrator rights on their workstations and are <br />they able to install their own software? <br />• How does the staff find out about the publication of security patches, <br />updates and security fixes and how are they tested, implemented, and <br />validated? <br />• Is local software, like Adobe Acrobat, Flash, Java, etc. patched along <br />with other software on workstations, laptops and servers? <br />• GPOs applied to enforce security: <br />• Password requirements <br />• Account lockout requirements <br />• Logging configuration for servers and workstations <br />• Firewall policy
The URL can be used to link to this page
Your browser does not support the video tag.