From Windows 8/8.1 Security Technical Implementation Guide
Part of Physical security
Associated with: CCI-000366
Inadequate physical protection can undermine all other security precautions utilized to protect the system. This can jeopardize the confidentiality, availability, and integrity of the system. Physical security is the first line of protection of any system.
Verify user workstations containing sensitive data are in access-controlled areas. Users must maintain control of, and protect, mobile systems. If systems are not adequately protected, this is a finding.
Establish site policy that ensures workstations containing sensitive data are located inside a controlled access area. Establish a policy on protecting mobile systems outside of controlled areas.
Lavender hyperlinks in small type off to the right (of CSS
class id
, if you view the page source) point to
globally unique URIs for each document and item. Copy the
link location and paste anywhere you need to talk
unambiguously about these things.
You can obtain data about documents and items in other
formats. Simply provide an HTTP header Accept:
text/turtle
or
Accept: application/rdf+xml
.
Powered by sagemincer