By Keiter CPAs
Identifying designated locations for endpoint protection
As part of a series of articles about CMMC Level 1 Practices, the Keiter Technology team discusses the first of three CMMC Level 1 requirements related to endpoint protection. CMMC Practice Guide SI.L1-3.14.2 requires organizations to identify where endpoint protection software is needed. Identifying the impact and likelihood of malware on a device will help provide a clearer picture of the risk.
The objectives of this assessment are to determine if designated locations for malicious code protection are identified and
if protection from malicious code at these designated locations is provided. To learn more about what you as a government contractor should consider to meet these objectives, read the full article here:
If you want to learn more about CMMC, Keiter’s team of cybersecurity specialists can help you. Email | Call: 804.747.0000.
About the Author
The information contained within this article is provided for informational purposes only and is current as of the date published. Online readers are advised not to act upon this information without seeking the service of a professional accountant, as this article is not a substitute for obtaining accounting, tax, or financial advice from a professional accountant.