2.0
Level 2 Description: Users can install software in organizational systems if provided the necessary privileges. To maintain control over the software i...
Wed, 19 Jul, 2023 at 12:08 AM
Level 1 Description: Common device identifiers include Media Access Control (MAC), Internet Protocol (IP) addresses, or device-unique token identifiers...
Wed, 19 Jul, 2023 at 12:19 AM
Level 1 Description: Individual authenticators include the following: passwords, key cards, cryptographic devices, and one-time password devices. Initi...
Wed, 19 Jul, 2023 at 12:28 AM
Level 2 Description: Multifactor authentication requires the use of two or more different factors to authenticate. The factors are defined as something...
Wed, 19 Jul, 2023 at 12:38 AM
Level 2 Description: Authentication processes resist replay attacks if it is impractical to successfully authenticate by recording or replaying previou...
Wed, 19 Jul, 2023 at 12:54 AM
Level 2 Description: Identifiers are provided for users, processes acting on behalf of users, or devices (3.5.). Preventing reuse of identifiers implie...
Wed, 19 Jul, 2023 at 1:02 AM
Level 2 Description: Inactive identifiers pose a risk to organizational information because attackers may exploit an inactive identifier to gain undete...
Wed, 19 Jul, 2023 at 1:12 AM
Level 2 Description: This requirement applies to single-factor authentication of individuals using passwords as individual or group authenticators, and...
Wed, 19 Jul, 2023 at 4:12 AM
Level 2 Description: Password lifetime restrictions do not apply to temporary passwords Priority: High Domain: IDENTIFICATION AND AUTHENTICA...
Wed, 19 Jul, 2023 at 4:21 AM
Level 2 Description: Changing temporary passwords to permanent passwords immediately after system logon ensures that the necessary strength of the auth...
Wed, 19 Jul, 2023 at 4:31 AM