The National Cyber Security Centre (NCSC) have recently added to their collection of guidance with the publication (Beta release) of Device Security Principles for enterprise connected devices.
Having supported the review process, Becrypt have now completed and published an initial compliance assessment for Paradox, Becrypt’s security-focused operating system.
For organisations looking to evaluate software platforms for enterprise connected devices, the compliance report for Paradox can be requested below.
What use are Device Security Principles?
NCSC Device Security Principles help organisations gain confidence that enterprise connected devices are protected against common cyber security threats and risks.
Organisations can use the principles as a framework to assist in the procurement of secure, enterprise-connected devices.
What are Principles?
- Provide updates, securely
- Support appropriate authentication
- Protect data at rest and in transit
- Maintain device integrity
- Ensure transparency of device health
- Permit only trusted software
- Minimise the privilege and reach of applications
- Constrain the use of all device interfaces
- Allow robust device management
- Provide security logging, alerting and monitoring capabilities
- Enable recovery to a known good state
To find out more about Paradox alignment with the principles, please request the assessment report below.