Endpoint security controls

Anti-Virus and Endpoint Protection

Eunoiana Dev requires company devices used for business work to maintain endpoint protection, including anti-virus and anti-malware controls provided by the operating system or approved security software.

Owner: Eunoiana Dev Effective date: 18 April 2026 Applies to: Company devices and business workstations

Control Statement

Eunoiana Dev uses endpoint protection on company devices, including anti-virus and anti-malware controls. Where devices use modern operating systems with built-in protection, those protections are kept enabled. Where additional security software is required, approved endpoint protection tools may be used.

Devices used for company work are expected to remain current with operating system security updates, browser updates, application updates and endpoint protection definitions where applicable.

Anti-Virus and Anti-Malware

Company endpoints are expected to run active anti-virus or anti-malware protection. Built-in protections such as Microsoft Defender, Apple platform protections or approved third-party tools may be used depending on the device and operating system.

Security Updates

Operating system, browser and key application updates are applied in a timely manner. Devices used for development work are expected to maintain supported software versions and avoid unnecessary legacy tooling.

Device Access

Company devices are protected with user authentication such as passwords, PINs or biometric controls where available. Administrative access is limited to authorised users and used only when required.

Credential Protection

Credentials, API keys and production secrets are not stored casually on endpoints. Password managers, hosting environment variables and platform secret management are used where appropriate.

Safe Software Use

Software used for company work should come from reputable sources. Untrusted downloads, unknown browser extensions and unnecessary background tools are avoided on devices that access client systems.

Lost or Compromised Devices

If a company device is lost, stolen or suspected to be compromised, Eunoiana Dev will assess the risk, rotate relevant credentials where needed, revoke access to affected services and notify impacted clients if appropriate.

Review and Maintenance

Endpoint security expectations are reviewed as tools, operating systems and client requirements change. Eunoiana Dev may update this page to reflect improved practices or new platform requirements.

Questions about these controls can be sent to hello@eunoiana.com.