JumpCloud Conditional Access<\/a> policies make it easy to enforce MFA on cloud services using JumpCloud to protect Push, OTP, or WebAuthN such as touchID, Windows Hello, or FIDO2 keys. <\/p>\n\n\n\nJumpCloud can also take this one step further by restricting service access from certain geographies, restricting the service to known IP addresses, and restricting access to managed devices. You can implement these policies individually or in combination. <\/p>\n\n\n\n
8. Have you been through the devices that you have and disabled the software that you don\u2019t use?<\/h3>\n\n\n\n
Review your devices with a view to removing services, software, or applications that are not required. This might include a server running a default web server that you don\u2019t use, additional accounts on some devices that are not required, or any additional software that you don\u2019t use.<\/p>\n\n\n\n
JumpCloud Policies and commands can be used to both report on and disable software running on devices that are not needed<\/p>\n\n\n\n
9. Have you ensured that all the accounts on your devices and cloud services are only those used as part of your day-to-day business?<\/h3>\n\n\n\n
JumpCloud can assist in the auditing of user accounts on devices. If dormant accounts exist JumpCloud\u2019s commands functionality can be used to either disable or remove those accounts. Relative to cloud applications where supported user lifecycle management can be used for both provisioning and de-provisioning of accounts<\/p>\n\n\n\n
10. Is \u201cAutoRun\u201d or \u201cAutoPlay\u201d disabled on all of your systems?<\/h3>\n\n\n\n
Auto-Run or Auto-Play is a setting that automatically runs software on a DVD or memory stick. It is important to disable Auto-Run or Auto-Play in order to avoid automatic installations of unauthorised software. <\/p>\n\n\n\n
When Auto-Run or Auto-Play is disabled, the user is prompted to give permission every time before the software is allowed to run or play. Use JumpCloud policies to disable autorun\/autoplay on JumpCloud managed devices<\/p>\n\n\n\n
11. For mobile devices, do you set a locking mechanism on your devices to access the software and services installed? This might be a pin number, a password, face scan, or a fingerprint.<\/h3>\n\n\n\n
Unfortunately, company devices sometimes get lost, stolen, or misplaced. Setting a unique 6-character or more password, pin number, or biometric method to unlock devices minimises the risk of a breach in these situations. <\/p>\n\n\n\n
JumpCloud\u2019s iOS device management allows you to configure both corporate and personal devices with device locks. Android is coming soon. <\/p>\n\n\n\n
12. Do you ensure that all default passwords on all devices are changed?<\/h3>\n\n\n\n
It\u2019s not difficult to find device default passwords with a quick internet search. Attackers sometimes use a default username and password combination to attempt a connection, even if the device is within your internal network. <\/p>\n\n\n\n
Simply by changing the default password (and username if possible), you have immediately made a hacker\u2019s job more difficult. JumpCloud user management ensures employees change default passwords at first login. <\/p>\n\n\n\n
13. Do you make sure that each user requires their own username and password and that there are no shared usernames\/passwords?<\/h3>\n\n\n\n
JumpCloud MDM ensures no shared usernames and passwords exist. When shared usernames and passwords are unavoidable the JumpCloud password manager allows for the auto-creation of long complex passwords that can be securely shared between team members. <\/p>\n\n\n\n
The password manager also allows for the sharing of OTP codes giving JumpCloud users the unique ability to share both passwords and OTPs.<\/p>\n\n\n\n
14. Do you have something written down to advise all users about creating good passwords? Does your policy specify the technical controls to manage the quality of passwords used within your organisation? Does the policy include a process for when you believe that a password or an account has been compromised?<\/h3>\n\n\n\n
A password policy must detail the process for creating passwords for all work<\/p>\n\n\n\n
accounts. A password for a work account must include one of the following:<\/p>\n\n\n\n
\n- Using multi-factor authentication<\/li>\n\n\n\n
- A minimum password length of at least 12 characters, with no maximum length restrictions<\/li>\n\n\n\n
- A minimum password length of at least 8 characters, with no maximum<\/li>\n\n\n\n
- Length restrictions and automatic blocking of common passwords using a deny list.<\/li>\n<\/ul>\n\n\n\n
JumpCloud\u2019s password policy allows you to centrally configure a password policy that meets your requirements in terms of length, complexity, originality, and aging. <\/p>\n\n\n\n
15. Have you put measures in place to protect accounts against brute-force password guessing?<\/h3>\n\n\n\n
Brute force attacks use computers to target a login page where hackers may try different character combinations until the correct combination is found to crack the password.<\/p>\n\n\n\n
Depending on the length and complexity of the password, cracking it can take anywhere from a few seconds to many years! Using a long and complicated password is a good way to protect your data from a brute-force attack. <\/p>\n\n\n\n
Use JumpCloud to implement MFA for SaaS apps, device login, LDAP, and radius-connected resources. A central configurable lockout policy further enhances protection against brute force attacks<\/p>\n\n\n\n
16. Are all of your computers, your laptops, and your mobile phones protected against malware by using one of these options? (Select the ones that apply.)<\/h3>\n\n\n\n
You can largely avoid the potential harm from malware by:<\/p>\n\n\n\n