800-171
							 Description:     This requirement applies to individuals who are performing hardware or software maintenance on organizational systems, while 3.0. addresses...
						  
						
						Wed, 12 Jul, 2023 at  6:14 AM
					
							 Description:    System media includes digital and non-digital media. Digital media includes diskettes, magnetic tapes, external and removable hard disk driv...
						  
						
						Wed, 12 Jul, 2023 at  6:09 AM
					
							 Description:     Access can be limited by physically controlling system media and secure storage areas. Physically controlling system media includes conduct...
						  
						
						Wed, 12 Jul, 2023 at  6:05 AM
					
							 Description:     This requirement applies to all system media, digital and non-digital, subject to disposal or reuse. Examples include: digital media found ...
						  
						
						Wed, 12 Jul, 2023 at  6:02 AM
					
							 Description:     The term security marking refers to the application or use of human-readable security attributes. System media includes digital and non-dig...
						  
						
						Wed, 12 Jul, 2023 at  6:00 AM
					
							 Description:     Controlled areas are areas or spaces for which organizations provide physical or procedural controls to meet the requirements established f...
						  
						
						Sat, 8 Jul, 2023 at  1:45 PM
					
							 Description:     This requirement applies to portable storage devices (e.g., USB memory sticks, digital video disks, compact disks, external or removable ha...
						  
						
						Wed, 12 Jul, 2023 at  5:51 AM
					
							 Description:    In contrast to requirement 3.8., which restricts user access to media, this requirement restricts the use of certain types of media on syste...
						  
						
						Wed, 12 Jul, 2023 at  5:46 AM
					
							 Description:     Requiring identifiable owners (e.g., individuals, organizations, or projects) for portable storage devices reduces the overall risk of usin...
						  
						
						Wed, 12 Jul, 2023 at  5:39 AM
					
							 Description:     Organizations can employ cryptographic mechanisms or alternative physical controls to protect the confidentiality of backup information at ...
						  
						
						Wed, 12 Jul, 2023 at  5:35 AM