800-171
Description: Users can install software in organizational systems if provided the necessary privileges. To maintain control over the software installed,...
Tue, 11 Jul, 2023 at 5:38 AM
Description: Common device identifiers include Media Access Control (MAC), Internet Protocol (IP) addresses, or device-unique token identifiers. Managem...
Tue, 11 Jul, 2023 at 5:41 AM
Description: Individual authenticators include the following: passwords, key cards, cryptographic devices, and one-time password devices. Initial authen...
Tue, 11 Jul, 2023 at 5:45 AM
Description: Multifactor authentication requires the use of two or more different factors to authenticate. The factors are defined as something you know ...
Tue, 11 Jul, 2023 at 5:49 AM
Description: Authentication processes resist replay attacks if it is impractical to successfully authenticate by recording or replaying previous authent...
Tue, 11 Jul, 2023 at 5:52 AM
Description: Identifiers are provided for users, processes acting on behalf of users, or devices (3.5.). Preventing reuse of identifiers implies prevent...
Tue, 11 Jul, 2023 at 6:35 AM
Description: Inactive identifiers pose a risk to organizational information because attackers may exploit an inactive identifier to gain undetected acce...
Tue, 11 Jul, 2023 at 6:39 AM
Description: This requirement applies to single-factor authentication of individuals using passwords as individual or group authenticators, and in a sim...
Tue, 11 Jul, 2023 at 6:43 AM
Description: Password lifetime restrictions do not apply to temporary passwords Priority: High Category: Centralized Controls Management ...
Tue, 11 Jul, 2023 at 6:49 AM
Description: Changing temporary passwords to permanent passwords immediately after system logon ensures that the necessary strength of the authentication...
Tue, 11 Jul, 2023 at 6:53 AM