In this section find security requirements and best practices for Duke computing assets including servers and end user devices, including desktops, laptops, and mobile devices. Device security includes managing the inventory of assets, managing device access, maintaining audit logs, and using security tools, such as endpoint protection tools. For protection personal devices, see the Personal Device Security Guide.
Applicable Policies, Procedures, and Standards:
- Duke University Standard: Server Security
- Duke University Standard: Laptop and Desktop Security
- Preferred Security Practice: Hardening Desktops, Laptops, and Servers
- Endpoint Device Security and Quarantining Practices
- Log Retention Policy
To find Duke Health (Am I Duke Health?) security policies and standards:
Go to Policy Tech at dukeuniversity.policytech.com. Select Duke Health enterprise and see a grouping of information security policies and standards.