End point security in Information Technology General Controls

1. Policy and Governance

2. Asset Management

3. Access Control

4. Endpoint Protection

5. Configuration Management

6. Security Awareness and Training

7. Incident Response

8. Monitoring and Reporting

9. Backup and Recovery

10. Continuous Improvement

Related Checklists