Security foundations - End User Computing (EUC) Lens

Security foundations

EUCSEC01: How do you identify and categorize risk profiles for users accessing your EUC services?

The organization implementing EUC services may have different users with different risk profiles associated with them. Use the following best practices to achieve the appropriate security posture for the users accessing the services.

EUCSEC02: How do you maintain security and compliance for users accessing your EUC environment?

The organization implementing EUC services may have external regulatory frameworks, standards, and internal policies that are in scope for the EUC environment. When implementing the configuration of EUC services, it is important that these are fully considered for all types of users and stakeholders accessing your environment.

EUCSEC03: How do you implement least privilege access to applications?

The principle of least privilege maintains that a user or entity should only have access to the specific data, resources and applications needed to complete a required task