Posts

Showing posts from November, 2025

CMMC L 2 - Control AC. L2-3.1.10: Workstation Lockout [M365 environment]

Objective:  Prevent unauthorized access to unattended systems by enforcing automatic workstation lockout after a defined period of inactivity. Overview of the Control CMMC Level 2 requires organizations to implement technical safeguards that ensure unattended workstations automatically lock after a specified period of inactivity. This control maps to: NIST 800-171 Reference : 3.1.10[a], [b], [c] – Access Control 3.13.15 – System and Communications Protection Implementation Plan 🔹 Step 1: Define Organizational Policy Create or update your Workstation Configuration Policy to include: Lockout after 15 minutes of inactivity Applies to all endpoints handling CUI Enforcement via Microsoft Intune for both Windows and macOS Manual lockout behavior encouraged through user training 🔹 Step 2: Configure Windows Devices via Intune Tool : Microsoft Intune Settings Catalog Platform : Windows 10/11 and later         Configuration Steps: Sign ...

How to Think Like an Attacker - Without Breaking the Law

Red Team for Blue Minds By Rana Jahandad Khan Most people think red teaming means hacking into systems. But for defenders like us especially those working for CMMC , ITAR red teaming starts with thinking like an attacker while staying 100% legal and ethical. I’m not a hacker. I’m a compliance architect and a systems builder. But I’ve learned that if you want to defend your organization, you need to understand how attackers think and how they exploit what we overlook. What Attackers Exploit (That We Can Fix) Unmanaged phones: with WhatsApp or Telegram - easy targets for social engineering Over-permissioned accounts :  attackers love stale admin rights No Conditional Access :  one stolen password = full access No audit trail :  if you can’t prove it, it didn’t happen No backup strategy:   ransomware ’s best friend How I Study Attackers (Legally) Google OSINT : filetype:pdf CMMC breach report MITRE ATT&CK Navigator : Map tactics to your environme...