2.0
Level 2 Description: System use notifications can be implemented using messages or warning banners displayed before individuals log in to organizationa...
Fri, 14 Jul, 2023 at 9:42 AM
Level 2 Description: Session locks are temporary actions taken when users stop work and move away from the immediate vicinity of the system but do not ...
Mon, 17 Jul, 2023 at 3:09 AM
Level 2 Description: This requirement addresses the termination of user-initiated logical sessions in contrast to the termination of network connection...
Mon, 17 Jul, 2023 at 3:23 AM
Level 2 Description: Remote access is access to organizational systems by users (or processes acting on behalf of users) communicating through external...
Mon, 17 Jul, 2023 at 3:32 AM
Level 2 Description: Cryptographic standards include FIPS-validated cryptography and NSA-approved cryptography. See [NIST CRYPTO]; [NIST CAVP]; [NIST C...
Mon, 17 Jul, 2023 at 3:44 AM
Level 2 Description: Routing remote access through managed access control points enhances explicit, organizational control over such connections, reduc...
Mon, 17 Jul, 2023 at 3:54 AM
Level 2 Description: A privileged command is a human-initiated (interactively or via a process operating on behalf of the human) command executed on a ...
Mon, 17 Jul, 2023 at 4:05 AM
Level 2 Description: Establishing usage restrictions and configuration/connection requirements for wireless access to the system provides criteria for ...
Mon, 17 Jul, 2023 at 4:14 AM
Level 2 Description: Organizations authenticate individuals and devices to help protect wireless access to the system. Special attention is given to th...
Mon, 17 Jul, 2023 at 4:23 AM
Level 2 Description: A mobile device is a computing device that has a small form factor such that it can easily be carried by a single individual; is d...
Mon, 17 Jul, 2023 at 5:09 AM