800-171

NIST 800-171 3.13.15 Protect the authenticity of communications sessions.
Description: Authenticity protection includes protecting against man-in-the-middle attacks, session hijacking, and the insertion of false information into ...
Tue, 11 Jul, 2023 at 3:11 AM
NIST 800-171 3.1.13 Employ cryptographic mechanisms to protect the confidentiality of remote access sessions.
Description: Cryptographic standards include FIPS-validated cryptography and NSA-approved cryptography. See [NIST CRYPTO]; [NIST CAVP]; [NIST CMVP]; Nation...
Tue, 11 Jul, 2023 at 1:27 AM
NIST 800-171 3.13.14 Control and monitor the use of Voice over Internet Protocol (VoIP) technologies.
Description: VoIP has different requirements, features, functionality, availability, and service limitations when compared with the Plain Old Telephone Ser...
Tue, 11 Jul, 2023 at 3:33 AM
NIST 800-171 3.1.14 Route remote access via managed access control points.
Description:  Routing remote access through managed access control points enhances explicit, organizational control over such connections, reducing the sus...
Tue, 11 Jul, 2023 at 1:36 AM
NIST 800-171 3.13.13 Control and monitor the use of mobile code.
Description: Mobile code technologies include Java, JavaScript, ActiveX, Postscript, PDF, Flash animations, and VBScript. Decisions regarding the use of mo...
Tue, 11 Jul, 2023 at 4:49 AM
NIST 800-171 3.13.12 Prohibit remote activation of collaborative computing devices and provide indication of devices in use to users present at the device.
Description: Collaborative computing devices include networked white boards, cameras, and microphones. Indication of use includes signals to users when col...
Tue, 11 Jul, 2023 at 5:01 AM
NIST 800-171 3.1.15 Authorize remote execution of privileged commands and remote access to security-relevant information.
Description:  A privileged command is a human-initiated (interactively or via a process operating on behalf of the human) command executed on a system invo...
Tue, 11 Jul, 2023 at 1:45 AM
NIST 800-171 3.1.16 Authorize wireless access prior to allowing such connections
Description:  Establishing usage restrictions and configuration/connection requirements for wireless access to the system provides criteria for organizatio...
Tue, 11 Jul, 2023 at 1:54 AM
NIST 800-171 3.13.11 Employ FIPS-validated cryptography when used to protect the confidentiality of CUI.
Description: Cryptography can be employed to support many security solutions including the protection of controlled unclassified information, the provision...
Tue, 11 Jul, 2023 at 5:07 AM
NIST 800-171 3.1.17 Protect wireless access using authentication and encryption
Description:  Organizations authenticate individuals and devices to help protect wireless access to the system. Special attention is given to the wide vari...
Tue, 11 Jul, 2023 at 2:01 AM