Define, implement and evaluate processes, procedures and technical measures to enable the deletion of company data remotely on managed endpoint devices.
Define, implement and evaluate processes, procedures, and technical measures to enable the deletion of company data remotely on managed endpoint devices, such as when a device is lost or stolen. Only rarely should the network administrator or device owner issue the remote wipe command since it is potentially destructive and removes all content until the device returns to its factory state.
- Examine procedures for adequacy, currency, communication, and effectiveness.
- Determine the extent and applicability of the processes, procedures, and technical measures over managed endpoints, as identified.
- Examine policy and procedures for evidence of review, with respect to effectiveness.
[csf.tools Note: For more information on the Cloud Controls Matrix, visit the CSA Cloud Controls Matrix Homepage.]
Cloud Control Matrix is Copyright 2023 Cloud Security Alliance.