What Should a CAD Manager Do in Response to Cyber Threats?
Companies have been forced to change the way they do business and implement new security measures as a result of the profusion of malware and well-publicized breaches. Many IT departments are staffing up with security experts, focus on network, email, internet, and data security, but are often not aware of the specific threats and countermeasures encountered in an AutoCAD environment.
What security best practices should be followed in using AutoCAD based products?
Make sure that everyone always operates with the Windows UAC (User Account Control) enabled and locate their executable files in a protected folder under UAC control such as C:\Program Files. Do not allow people to operate with Administrative privileges. This practice will help prevent unauthorized changes to people’s computers.
Keep executable code and applications related to AutoCAD separate from the design data, and restrict it to run only from authorized locations. This precaution makes it easier to control and audit the executable files being loaded into AutoCAD, and it’s less likely that malicious code can execute secretly.
With genuine, up-to-date AutoCAD-based products, you remain current with Autodesk countermeasures against cyber-attackers. Do not allow counterfeit or cracked copies to be used in your AutoCAD environment.
Promote safe behavior regarding executable files and applications from untrusted sources, ZIP files, and drawing files with an untrusted origin.
What protection is included for AutoCAD?
The following is a list of countermeasures specific to AutoCAD:
System variables that control security options and warnings can be enabled and locked with the CAD Manager Control utility: LEGACYCODESEARCH, SECURELOAD, and TRUSTEDPATHS. In addition, system variables can be monitored for changes using the SYSVARMONITOR command.
Starting with AutoCAD 2016, AutoLISP files can be self-signed, which provides local security and can ensure that these files have not been altered or replaced.