Skip to main content

Recently Updated Pages

🧠 Guide: How to Create AI Assisted Knowledge Base Articles in Bookstack

Intro to DTC's Knowledge Base AI Assisted Documenting

📘 Purpose This guide helps DTC team members properly document and migrate non-client-specific tec...

Updated 5 months ago by Nate Smith

Vendor Security & Technical Requirements

Overview DTC Inc. holds all vendors to a high standard, especially those providing products, pla...

Updated 7 months ago by Nate Smith

5.3 Data Protection

DTC MSA Security Baseline

5.3 Data Protection Endpoints: a. Encrypt all Windows servers equipped with a Trusted...

Updated 8 months ago by Nate Smith

5.5 Workstations & Endpoints

DTC MSA Security Baseline

5.5 Workstations & Endpoints Configuration Standards: a. Disable Windows Management I...

Updated 8 months ago by Mike Cooper

Overview

DTC MSA Security Baseline

1. Purpose This policy outlines DTC’s baseline security protections that can be universally ap...

Updated 8 months ago by Mike Cooper

6. Additional Services and Clarifications

DTC MSA Security Baseline

6. Additional Services and Clarifications This Baseline Security Protections Policy outlines t...

Updated 8 months ago by Mike Cooper

5.2 Compute Resources

DTC MSA Security Baseline

5.2 Compute Resources Role-Based Access Control (RBAC): a. DTC retains and manages cred...

Updated 8 months ago by Mike Cooper

5.1 Identity Management

DTC MSA Security Baseline

5.1 Identity Management User Lifecycle Management: a. Provision unique identifiers fo...

Updated 8 months ago by Mike Cooper

5.4 Network Security

DTC MSA Security Baseline

5.4 Network Security a. All remote access is delivered via a Console Remote Access Solutio...

Updated 8 months ago by Mike Cooper

Glossary

DTC MSA Security Baseline

Glossary of Abbreviations ACL: Access Control List​Cyber Readiness Center+1HackerCombat+1 ...

Updated 8 months ago by Nate Smith