800-171
Description: System use notifications can be implemented using messages or warning banners displayed before individuals log in to organizational systems. ...
Tue, 11 Jul, 2023 at 6:18 AM
Description: Session locks are temporary actions taken when users stop work and move away from the immediate vicinity of the system but do not want to log...
Tue, 11 Jul, 2023 at 6:19 AM
Description: Periodic scans of organizational systems and real-time scans of files from external sources can detect malicious code. Malicious code can be e...
Mon, 10 Jul, 2023 at 9:07 AM
Description: This requirement addresses the termination of user-initiated logical sessions in contrast to the termination of network connections that are ...
Tue, 11 Jul, 2023 at 6:20 AM
Description: System monitoring includes external and internal monitoring. System monitoring can detect unauthorized use of organizational systems. System m...
Tue, 11 Jul, 2023 at 2:41 AM
Description: There are many publicly available sources of system security alerts and advisories. For example, the Department of Homeland Security’s Cyberse...
Tue, 11 Jul, 2023 at 2:43 AM
Description: Designated locations include system entry and exit points which may include firewalls, remote-access servers, workstations, electronic mail se...
Tue, 11 Jul, 2023 at 2:44 AM
Description: Organizations identify systems that are affected by announced software and firmware flaws including potential vulnerabilities resulting from t...
Tue, 11 Jul, 2023 at 2:44 AM
Description: Remote access is access to organizational systems by users (or processes acting on behalf of users) communicating through external networks (e...
Tue, 11 Jul, 2023 at 6:21 AM
Description: Information at rest refers to the state of information when it is not in process or in transit and is located on storage devices as specific c...
Mon, 17 Jul, 2023 at 8:45 AM