{"id":33,"date":"2025-04-29T00:47:30","date_gmt":"2025-04-29T00:47:30","guid":{"rendered":"https:\/\/student.wp.odu.edu\/cvald006\/?page_id=33"},"modified":"2025-04-29T00:47:30","modified_gmt":"2025-04-29T00:47:30","slug":"walmart-endpoint-security-policy","status":"publish","type":"page","link":"https:\/\/student.wp.odu.edu\/cvald006\/walmart-endpoint-security-policy\/","title":{"rendered":"Walmart Endpoint Security Policy"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<p><strong>1. Purpose<\/strong><\/p>\n\n\n\n<p>The purpose of this Endpoint Security Policy is to define and enforce security measures that ensure the confidentiality, integrity, and availability of Walmart&#8217;s IT systems, data, and digital assets. This policy outlines guidelines and practices for securing endpoints (such as workstations, laptops, mobile devices, and servers) within the organization\u2019s network infrastructure.<\/p>\n\n\n\n<p><strong>2. Scope<\/strong><\/p>\n\n\n\n<p>This policy applies to all employees, contractors, third-party vendors, and any individuals or entities with authorized access to Walmart\u2019s digital environment, systems, and data. It covers all hardware and software systems within the corporate network and those connected to it through remote access.<\/p>\n\n\n\n<p><strong>3. Definitions<\/strong><\/p>\n\n\n\n<ul>\n<li> \u00a0<strong>Endpoints<\/strong>: Devices that connect to the Walmart network or its systems, including laptops, desktops, smartphones, tablets, servers, and IoT devices.<\/li>\n\n\n\n<li>\u00a0<strong>Endpoint Protection<\/strong>: Security solutions (such as antivirus, firewalls, device encryption, etc.) implemented to safeguard endpoints from cyber threats.<\/li>\n\n\n\n<li><strong>BYOD (Bring Your Own Device)<\/strong>: Employee-owned devices allowed to connect to Walmart&#8217;s corporate network for work purposes.<strong>4. Endpoint Security Requirements<\/strong><\/li>\n<\/ul>\n\n\n\n<ul>\n<li> \u00a0<strong>Device Configuration and Hardening<\/strong>: All endpoints must be configured to meet Walmart\u2019s minimum security standards, which include:\n<ul>\n<li>  Operating systems (OS) must be up-to-date with the latest security patches installed.<\/li>\n\n\n\n<li> \u00a0Applications and software must be updated regularly to reduce vulnerabilities.<\/li>\n\n\n\n<li> \u00a0Unnecessary services and ports must be disabled or blocked.<\/li>\n\n\n\n<li> \u00a0Device configurations must be secured by passwords or biometric authentication.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li> \u00a0<strong>Endpoint Protection Software<\/strong>:\n<ul>\n<li> \u00a0Walmart will deploy endpoint protection software on all corporate-owned andBYOD devices, which includes anti-malware, antivirus, and anti-ransomwaresoftware.<\/li>\n\n\n\n<li> \u00a0Endpoint protection must have automatic updates enabled and real-timescanning capabilities.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li> \u00a0<strong>Encryption<\/strong>:<\/li>\n<\/ul>\n\n\n\n<p> All endpoints storing sensitive or confidential data must be encrypted using industry-standard encryption protocols.<\/p>\n\n\n\n<p> Encryption should apply to both data at rest (stored data) and data in transit (data being transmitted across networks).<\/p>\n\n\n\n<ul>\n<li> \u00a0<strong>Access Control and Authentication<\/strong>:\n<ul>\n<li> \u00a0All endpoints must require strong, multi-factor authentication (MFA) for access.<\/li>\n\n\n\n<li> \u00a0User accounts must have unique logins and passwords, and password policiesmust enforce strength requirements (e.g., minimum length, complexity).<\/li>\n\n\n\n<li> \u00a0Role-based access controls (RBAC) will limit access to systems and data basedon the employee&#8217;s role and job responsibilities.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li> \u00a0<strong>Device Tracking and Monitoring<\/strong>:\n<ul>\n<li> \u00a0Endpoint activity will be logged and monitored in real-time to detect suspicious activity and potential breaches.<\/li>\n\n\n\n<li> \u00a0Automated alerts will be triggered for unauthorized access attempts, malware detection, or unusual activity patterns.<\/li>\n\n\n\n<li> \u00a0Remote wipe capabilities must be enabled on all endpoints, especially for mobile devices or laptops used by employees, to protect data in case of loss or theft.<strong>5. Remote Access and BYOD<\/strong><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<ul>\n<li> \u00a0<strong>Remote Access<\/strong>:\n<ul>\n<li> \u00a0Walmart will provide secure VPN connections for employees working remotely oraccessing the network from external locations.<\/li>\n\n\n\n<li> \u00a0Remote access will require multi-factor authentication (MFA) and be restricted toauthorized users based on business needs.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li> \u00a0<strong>BYOD Policy<\/strong>:\n<ul>\n<li> \u00a0Personal devices used for work purposes must comply with Walmart\u2019s security requirements, including installing endpoint protection software and encryption.<\/li>\n\n\n\n<li> \u00a0Employees must register their personal devices with the IT department beforeconnecting them to Walmart\u2019s network.<\/li>\n\n\n\n<li> \u00a0Walmart reserves the right to access, monitor, or remove any data from personaldevices connected to the corporate network in the event of a security breach or investigation.<strong>6. Security Awareness and Training<\/strong><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<ul>\n<li> \u00a0<strong>Training<\/strong>: All employees and contractors must complete cybersecurity training on how to secure their endpoints, recognize phishing attempts, and respond to security incidents.<\/li>\n\n\n\n<li> \u00a0<strong>Phishing Protection<\/strong>: Employees should be educated on the risks of phishing, spear-phishing, and social engineering attacks and how to avoid them.<\/li>\n\n\n\n<li> \u00a0<strong>Incident Reporting<\/strong>: Employees must immediately report any security incidents, including suspicious device behavior, potential malware infections, or device theft or loss.<strong>7. Incident Response<\/strong><\/li>\n<\/ul>\n\n\n\n<p> In the event of an endpoint security breach, Walmart will follow its Incident Response Plan (IRP), which includes:<\/p>\n\n\n\n<ul>\n<li> \u00a0Isolation of affected devices to contain the spread of malware or unauthorized access.<\/li>\n\n\n\n<li> \u00a0Forensic investigation to determine the scope and source of the breach.<\/li>\n\n\n\n<li> \u00a0Remediation steps to remove threats, restore systems, and reinforce securitymeasures.<\/li>\n\n\n\n<li> \u00a0Notification to affected individuals, regulators, and stakeholders as required bylaw.<strong>8. Compliance<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Walmart will ensure compliance with relevant regulatory requirements and industry standards related to endpoint security, including:<\/p>\n\n\n\n<ul>\n<li> \u00a0General Data Protection Regulation (GDPR)<\/li>\n\n\n\n<li> \u00a0California Consumer Privacy Act (CCPA)<\/li>\n\n\n\n<li> \u00a0Payment Card Industry Data Security Standard (PCI DSS)<\/li>\n\n\n\n<li> \u00a0Health Insurance Portability and Accountability Act (HIPAA)<strong>9. Enforcement<\/strong><\/li>\n<\/ul>\n\n\n\n<ul>\n<li> \u00a0Non-compliance with this Endpoint Security Policy may result in disciplinary action, up to and including termination of employment or contracts.<\/li>\n\n\n\n<li>\u00a0Walmart reserves the right to audit endpoints, systems, and networks for compliance with this policy.<strong>10. Review and Update<\/strong>This policy will be reviewed annually or as needed to ensure it remains relevant and aligned with evolving security threats, compliance requirements, and technological advancements.<strong>11. Conclusion<\/strong>Walmart is committed to maintaining the security and privacy of its systems and data. By adhering to the guidelines set forth in this Endpoint Security Policy, employees and contractors can contribute to the overall protection of Walmart\u2019s digital infrastructure, reducing the risk of security incidents and ensuring business continuity.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>1. Purpose The purpose of this Endpoint Security Policy is to define and enforce security measures that ensure the confidentiality, integrity, and availability of Walmart&#8217;s IT systems, data, and digital assets. This policy outlines guidelines and practices for securing endpoints (such as workstations, laptops, mobile devices, and servers) within the organization\u2019s network infrastructure. 2. Scope &hellip; <a href=\"https:\/\/student.wp.odu.edu\/cvald006\/walmart-endpoint-security-policy\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Walmart Endpoint Security Policy<\/span><\/a><\/p>\n","protected":false},"author":30325,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/cvald006\/wp-json\/wp\/v2\/pages\/33"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/cvald006\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/cvald006\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/cvald006\/wp-json\/wp\/v2\/users\/30325"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/cvald006\/wp-json\/wp\/v2\/comments?post=33"}],"version-history":[{"count":1,"href":"https:\/\/student.wp.odu.edu\/cvald006\/wp-json\/wp\/v2\/pages\/33\/revisions"}],"predecessor-version":[{"id":34,"href":"https:\/\/student.wp.odu.edu\/cvald006\/wp-json\/wp\/v2\/pages\/33\/revisions\/34"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/cvald006\/wp-json\/wp\/v2\/media?parent=33"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}