AiVRIC User Guide
Security policy

Endpoint Security

Secures laptops, servers, and other endpoints used to access AiVRIC systems.

Applies to AiVRIC workforce, partners, and subprocessors Trust Center Acceptable use

Purpose & scope

This policy guides how AiVRIC designs, operates, and validates Endpoint Security across production, corporate, and partner environments.

It applies to employees, contractors, vendors, and any system interacting with AiVRIC data or services.

Key controls

  • Require disk encryption, MFA, and screen lock on all endpoints.
  • Deploy EDR with real-time protection and centralized alerting.
  • Patch operating systems and critical software within defined SLAs.
  • Restrict admin privileges; use standard users for daily work.

Operating procedures

  • Enroll new endpoints into MDM/EDR before granting production access.
  • Review EDR alerts daily and investigate high-severity events.
  • Decommission endpoints with secure wipe and inventory update.

Evidence & ownership

Owner: Security & Compliance. Review cadence: annually or after material changes.

Evidence: Collected via AiVRIC audit logs, ticketing systems, monitoring dashboards, and vendor records as appropriate to this policy area.

Contact: [email protected]