-
ThreatLocker as a CMMC Compliance ControlView in Browser ThreatLocker's tools can assist your organization when you are working towards becoming CMMC compliant. ThreatLocker can be used as the control for specific practices, and assist in meeting other practices either by providing tools that can be used to help other applications meet the compliance level practice or by the ThreatLocker product itself meeting the practice. Access Control (AC) Domain C001 - Establish system access requirements Level 1 - "
-
ThreatLocker as a NIST 800-171 r1 ControlView in Browser ThreatLocker's tools can assist your organization when you are working towards becoming NIST 800-171 r1 compliant. ThreatLocker can be used as the control for specific practices, and assist in meeting other practices either by providing tools that can be used to help other applications meet the practice or by the ThreatLocker product itself meeting the practice. 3.1 Access Control Basic Security Requirements 3.1.1 - "Limit system access to authorized users, processes acting on behalf of authorized users, or devices (including other systems).
-
ThreatLocker as an Essential Eight Maturity Model Mitigation StrategyCorrected 6/1/2022 View in Browser Level 1 Application Control Description - "The execution of executables, software libraries, scripts, installers, compiled HTML, HTML Applications and control panel applets are prevented on workstations from within standard user profiles and temporary folders used by the operating system, web browsers and email clients." ThreatLocker helps meet this mitigation strategy. Utilizing Application Control, ThreatLocker enables the blocking of executables, installers, scripts, and software libraries on any endpoint by specific users or all users, specific folders or all folders, and specific Applications or all Applications.
-
ThreatLocker as an ISO 27001 Annex A ControlView in Browser Annex A.6 - Organization of Information Security 6.1.2 Segregation of Duties ThreatLocker can help create a least-privileged environment using Application Control by restricting what applications can run, who can use them, and when. Ringfencing can restrict the function of applications down to only what is necessary for business. Storage Control can allow you to block access to folders and files and only permit access to specific applications that need to access those areas.