Skip to main content

💼 A.9.4.2 Secure log-on procedures

  • ID: /frameworks/iso-iec-27001-2013/09/04/02

Description

Where required by the access control policy, access to systems and applications shall be controlled by a secure log-on procedure.

Similar

  • Internal
    • ID: dec-c-4acca53a

Similar Sections (Give Policies To)

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 NIST CSF v1.1 → 💼 PR.AC-1: Identities and credentials are issued, managed, verified, revoked, and audited for authorized devices, users and processes1934no data
💼 NIST CSF v1.1 → 💼 PR.AC-7: Users, devices, and other assets are authenticated (e.g., single-factor, multi-factor) commensurate with the risk of the transaction (e.g., individuals' security and privacy risks and other organizational risks)1923no data

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlagsCompliance

Policies (1)

PolicyLogic CountFlagsCompliance
🛡️ Google Accounts are not configured with MFA🟢⚪🟢 x2, ⚪ x1no data