View a markdown version of this page

Identity and access management - End User Computing (EUC) Lens

Identity and access management

EUCSEC04: How do you separate end user systems to meet your organization's policies?

When implementing EUC services, your organization may have requirements to separate compute devices accessed directly by end users from others used for infrastructure applications.

EUCSEC05: How do you manage application entitlements in your EUC environments?

Users should be entitled to access individual applications rather than provided access to all applications on end user systems. Apply this in a consistent way so that there is a minimal chance of operational failure or accidental granting of full access to all applications.

EUCSEC06: How do you authenticate and authorize access to your end user applications?

Strong and consistent authentication and authorization are key to the secure operation of an end user system to help prevent unauthorized access. Authentication using multiple factors may be a requirement, and the authentication system in use should satisfy this requirement.