💼 A.9.4.2 Secure log-on procedures
Description
Where required by the access control policy, access to systems and
applications shall be controlled by a secure log-on procedure.
Similar
Similar Sections (Give Policies To)
Section | Sub Sections | Internal Rules | Policies | Flags |
---|
💼 NIST CSF v1.1 → 💼 PR.AC-1: Identities and credentials are issued, managed, verified, revoked, and audited for authorized devices, users and processes | | 19 | 30 | |
💼 NIST CSF v1.1 → 💼 PR.AC-7: Users, devices, and other assets are authenticated (e.g., single-factor, multi-factor) commensurate with the risk of the transaction (e.g., individuals' security and privacy risks and other organizational risks) | | 19 | 23 | |
Sub Sections
Section | Sub Sections | Internal Rules | Policies | Flags |
---|
Policies (1)