Skip to content
English
  • There are no suggestions because the search field is empty.

CAF - B2.b Device Management

This article provides additional information on how you can meet the requirement for the CAF control - B2.b Device Management

User Devices

  • Only trusted, compliant, and authenticated devices can access the systems used to deliver managed services. 

  • Device compliance, including patching, endpoint protection and encryption should be enforced through an endpoint security tools  such as Microsoft Defender for Endpoint / CrowdStrike / Sophos / SentinelOne.

  • Certificate-based device identity is used to ensure only known and approved devices can access systems, using a system such as Entra ID certificate authentication / Intune certificates / Jamf certificates / Okta Device Trust.

  • Regular automated scans should run (using a system such as using Lansweeper / Auvik / Meraki / Nmap), to identify unknown or unauthorised devices. Any unexpected findings should be investigated immediately and blocked if necessary.

Privileged Access

  • Privileged operations are performed only from Privileged Access Workstations (PAWs) or other hardened administrative devices managed through a system such as Microsoft Intune / Datto RMM / NinjaOne / VMware Workspace ONE.

  • Administrative devices are restricted to authorised users with enforced MFA, encryption, and only approved applications only. They are separated from day-to-day user workstations.

  • Standard user devices cannot perform privileged activities.

Third party devices

  • Where third-party devices require access, either obtain assurance of their security posture or limit them to isolated, controlled environments e.g. using  a solution such as Azure AD B2B / VPN segmentation. Access is provided only after appropriate review and approval.