Technical Security Requirements

The technical security requirements are directly related to the sensitivity/criticality level of the data processed.

Workstation Security Requirements

Workstations include corporate personal computers (PCs), LANs, and LAN servers. When a workstation is used as a host, host security requirements apply.

Single User Workstation

A single user workstation is one which, though many people have access, may be used by one person at a time. Where single user workstations are installed, management should do the following:

 

Critical Level * Requirements
3, 2, 1
0
* See Appendix B for critical level definitions.

 

Multi-User Workstation

A multi-user workstation is one that can be accessed simultaneously by other workstations. In some cases a multi-user workstation may be configured to operate as a host, and the requirements for hosts will apply to that workstation, Otherwise, the requirements below should apply. Management, where multi-user corporate workstations are installed, should implement a process that accomplishes the following:

 

Critical Level * Requirements
3, 2
1
0
* See Appendix B for critical level definitions.