Skip to main content

IT Baseline Controls

 

 

What are Baseline Controls?

Baseline controls are developed to maximize NTPC's effectiveness of cyber security. By adopting basic cyber security practices, we can reduce our cyber threat exposure. These practices are implemented and enforced at NTPC.  

 

Baseline Control Description
5.1 - Two Factor Authentication Establishes guidelines for Two Factor Authentication or Multifactor Authentication (MFA) method used at NTPC. 
5.2 - Compromised Password Change Policy establishing password confidentiality and security and remediation of compromised passwords.
5.3 - Password Policy Length & Reuse Policy to establish guidelines for effectively creating, maintaining and protecting passwords at NTPC
8.1 - Mobile Device Ownership Model Describes NTPC's Mobile Device ownership model including a Bring Your Own Device (BYOD) as a mechanism of ownership. 
8.2 - Mobile Device Ownership and Usage Separation Policy to establish the boundaries of NTPC's role in managing a BYOD including a description of what IT can and cannot see. The separation between work and personal data. 
8.3 - Mobile Device Secure Sources Policy to enforce employees to only download mobile device applications from NPTC's list of trusted sources. 
8.4 - Mobile Device Encryption Policy to enforce employees to use mobile devices that have full mobile device native encryption. 
8.5 - Mobile Device Management  NTPC need to implement and maintain a Mobile Device Management System capable of separating NTPC's data and Personal data. 
8.6 - Mobile Device Secure Connectivity A policy to protect the confidentiality, integrity, and availability of NTPC's Infrastructure and Data. Describes the boundaries of acceptable and unacceptable mobile device use. 
NTPC Password Creation Guidance Accompanying Baseline Control 5.1, the intention of this document is to help NTPC's employee's & contractors create passwords that satisfy our cybersecurity requirements.