# Device Security Posture Assessment( DSPA)

Cloudbrink’s Device Security Posture Assessment enables organizations to provide a robust Zero-Trust Access solution, emphasizing the continuous assessment of user device postures for compliance with corporate security standards. Through the admin portal, administrators can seamlessly define and manage the Device Security Posture Assessment (DSPA) feature.&#x20;

This document provides and overview and basic configurations for the DSPA feature.&#x20;

Overview&#x20;

Device Posture Assessment comprises of two main categories:&#x20;

DSPA Profile - Defines what device checks to query&#x20;

DSPA Policy - Determines actions to take based on profile criteria&#x20;

The table below highlights key DSPA Profile configurations with extensive options in each category.&#x20;

<table data-header-hidden><thead><tr><th valign="top"></th><th></th><th></th></tr></thead><tbody><tr><td valign="top">OS Level Categories </td><td></td><td></td></tr><tr><td valign="top">Windows </td><td>MacOS </td><td>Linux </td></tr><tr><td valign="top">Firewall </td><td>Firewall </td><td>Firewall </td></tr><tr><td valign="top">OS </td><td>OS </td><td>OS </td></tr><tr><td valign="top">Disk Encryption </td><td>Disk Encryption </td><td>Disk Encryption </td></tr><tr><td valign="top">File </td><td>File </td><td>File </td></tr><tr><td valign="top">Blacklisted Processes </td><td>Blacklisted Processes </td><td>Blacklisted Processes </td></tr><tr><td valign="top">Certificates </td><td>Certificates </td><td></td></tr><tr><td valign="top">Patch </td><td>Trust Domain </td><td></td></tr><tr><td valign="top">Registry </td><td></td><td></td></tr><tr><td valign="top">Anti-Virus/Spyware </td><td></td><td></td></tr></tbody></table>

Select the “Configuration” gear on the left, followed by the “Policies” tab at the top.&#x20;

Device Profiles&#x20;

Select the “Device Security Posture Assessment (DSPA) Profile” option.&#x20;

The drop down will list any already created profiles, their conditions, and the option to create new profiles.&#x20;

<figure><img src="/files/0xEHDn6ZRWImcYvEn9nl" alt=""><figcaption></figcaption></figure>

<br>

Click the <img src="/files/62KoDhoXQEMJeWeED2ic" alt="" data-size="line"> logo in the bottom right to create a new profile.&#x20;

Enter a DSPA Profile name, and select if want the conditions to be “AND” or “OR”. “AND” statements require all compounding conditions to be true.&#x20;

“OR” statements require only one of the conditions to be true.&#x20;

<br>

A set of OR conditions can be grouped along with other checks with an implicit AND operation across them. For example, expressions are possible such as&#x20;

{(A OR B) AND C}&#x20;

{(A OR B) AND (C OR D) AND E}&#x20;

<br>

<figure><img src="/files/K0CdJI3bH47ubIeWF03q" alt=""><figcaption></figcaption></figure>

After selecting the condition type, select the OS for the first condition you want to configure.&#x20;

<figure><img src="/files/3ceEAb9T17b64ODZSMrm" alt="" width="375"><figcaption></figcaption></figure>

<br>

Then, select the OS level category and it’s value.&#x20;

When finished, select the  <img src="/files/UBM7o7osN9YLnClY44nJ" alt="" data-size="line"> icon in the top right to save.&#x20;

Create as many profiles as needed, but one profile/policy can only apply to a single device user group.&#x20;

### Device Policies

Device Policies define what actions to take when the profile criteria is not met. The three actions available are:&#x20;

1. Log\_and\_Allow: If profile criteria is not met, the user will still be permitted to sign on and provided the access defined by their device user group. The failure reasoning, and status will be logged in the portal for administrators to be aware or take action.&#x20;
2. Deny: If profile criteria is not met, the user will be denied access. The failure reasoning, and status will be logged in the portal for administrators to be aware or take action.&#x20;
3. Quarantine: If profile criteria is not met, the user will be placed into an admin defined resource template. This access can be at any required by your organization.&#x20;

   a. Example: If quarantined for not meeting an AV failure, quarantine resource template can be configured to only allow access to a subnet which the cyber security team can access the device from.&#x20;

&#x20;      b. Example: If quarantined for not meeting patch level requirements, quarantine resource template              can be configured to only allow access to a patch management server( SCCM, InTune, JAMF)

Expand the DSPA policies, and click the <img src="/files/lzxB02WzjDhQZ4Op9uEp" alt="" data-size="line"> logo to create a new policy.&#x20;

Create a policy name, and select the action to take.&#x20;

<br>

<figure><img src="/files/JQyZVVmRT3BOUvzcowah" alt=""><figcaption></figcaption></figure>

Select the DSPA Profile to map to the DSPA Policy.&#x20;

1. • In the DSPA Frequency field, select how often you want the DSPA profile criteria to be checked for. DSPA Frequency of zero (0) will result in having the check run only at login.&#x20;
2. Configuring and interval (in minutes) will result in the check being ran at login, and also on the interval configured&#x20;
3. If the DSPA profile criteria are not met at any interval the policy states will change accordingly.&#x20;
4. <br>

### Apply&#x20;

Apply the DSPA Policies to the desired device user group(s).

<figure><img src="/files/Z3JpVDvVY7nUu2EEvbRL" alt=""><figcaption></figcaption></figure>

<br>

#### Important Notes:&#x20;

File paths must be absolute. Do not use wildcards.&#x20;

Blacklist apps format based on the operating system:&#x20;

c. Windows: \<appName>.exe&#x20;

d. Mac: \<appName>.app&#x20;

e. Linux: \<appName>&#x20;

Patches must start with “KB” followed by numbers. Example: KB4487.&#x20;

Conditions are combined using “AND” by default unless specified in an “OR” group.&#x20;

“OR” groups must only contain conditions related to a single OS.&#x20;


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.cloudbrink.com/configuration/device-security-posture-assessment-dspa.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
