2.0
Level 2 Description: Organizations can employ full-device encryption or container-based encryption to protect the confidentiality of CUI on mobile de...
Mon, 17 Jul, 2023 at 5:18 AM
Level 2 Description: Limits on the use of organization-controlled portable storage devices in external systems include complete prohibition of the us...
Mon, 17 Jul, 2023 at 5:27 AM
Level 2 Description: Organizations determine the content and frequency of security awareness training and security awareness techniques based on the s...
Mon, 17 Jul, 2023 at 5:43 AM
Level 2 Description: Organizations determine the content and frequency of security training based on the assigned duties, roles, and responsibilities o...
Mon, 17 Jul, 2023 at 5:55 AM
Level 2 Description: Potential indicators and possible precursors of insider threat include behaviors such as inordinate, long-term job dissatisfaction...
Mon, 17 Jul, 2023 at 6:05 AM
Level 2 Description: System monitoring includes external and internal monitoring. System monitoring can detect unauthorized use of organizational syste...
Mon, 17 Jul, 2023 at 8:38 AM
Level 2 Description: System monitoring includes external and internal monitoring. External monitoring includes the observation of events occurring at the ...
Mon, 17 Jul, 2023 at 8:39 AM
Level 2 Description: An event is any observable occurrence in a system, which includes unlawful or unauthorized system activity. Organizations identify...
Mon, 17 Jul, 2023 at 7:04 AM
Level 2 Description: Periodic scans of organizational systems and real-time scans of files from external sources can detect malicious code. Malicious c...
Mon, 17 Jul, 2023 at 8:43 AM
Level 2 Description: This requirement ensures that the contents of the audit record include the information needed to link the audit event to the actio...
Mon, 17 Jul, 2023 at 7:18 AM