Endpoint security controls
Anti-Virus and Endpoint Protection
Eunoiana Dev requires company devices used for business work to maintain endpoint protection, including anti-virus and anti-malware controls provided by the operating system or approved security software.
Owner: Eunoiana Dev
Effective date: 18 April 2026
Applies to: Company devices and business workstations
Control Statement
Eunoiana Dev uses endpoint protection on company devices, including anti-virus and anti-malware controls. Where devices use modern operating systems with built-in protection, those protections are kept enabled. Where additional security software is required, approved endpoint protection tools may be used.
Devices used for company work are expected to remain current with operating system security updates, browser updates, application updates and endpoint protection definitions where applicable.
Anti-Virus and Anti-Malware
Company endpoints are expected to run active anti-virus or anti-malware protection. Built-in protections such as Microsoft Defender, Apple platform protections or approved third-party tools may be used depending on the device and operating system.
Security Updates
Operating system, browser and key application updates are applied in a timely manner. Devices used for development work are expected to maintain supported software versions and avoid unnecessary legacy tooling.
Device Access
Company devices are protected with user authentication such as passwords, PINs or biometric controls where available. Administrative access is limited to authorised users and used only when required.
Credential Protection
Credentials, API keys and production secrets are not stored casually on endpoints. Password managers, hosting environment variables and platform secret management are used where appropriate.
Safe Software Use
Software used for company work should come from reputable sources. Untrusted downloads, unknown browser extensions and unnecessary background tools are avoided on devices that access client systems.
Lost or Compromised Devices
If a company device is lost, stolen or suspected to be compromised, Eunoiana Dev will assess the risk, rotate relevant credentials where needed, revoke access to affected services and notify impacted clients if appropriate.