Skip to main content

πŸ’Ό PR.AC-6: Identities are proofed and bound to credentials and asserted in interactions

Description​

Empty...

Similar​

  • Sections
    • /frameworks/iso-iec-27001-2013/07/01/01
    • /frameworks/iso-iec-27001-2013/09/02/01
    • /frameworks/nist-sp-800-53-r4/ac/01
    • /frameworks/nist-sp-800-53-r4/ac/02
    • /frameworks/nist-sp-800-53-r4/ac/03
    • /frameworks/nist-sp-800-53-r4/ac/16
    • /frameworks/nist-sp-800-53-r4/ac/19
    • /frameworks/nist-sp-800-53-r4/ac/24
    • /frameworks/nist-sp-800-53-r4/ia/01
    • /frameworks/nist-sp-800-53-r4/ia/02
    • /frameworks/nist-sp-800-53-r4/ia/04
    • /frameworks/nist-sp-800-53-r4/ia/05
    • /frameworks/nist-sp-800-53-r4/ia/08
    • /frameworks/nist-sp-800-53-r4/pe/02
    • /frameworks/nist-sp-800-53-r4/ps/03
  • Internal
    • ID: dec-c-f39f2c6f

Similar Sections (Take Policies From)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό ISO/IEC 27001:2013 β†’ πŸ’Ό A.7.1.1 Screening
πŸ’Ό ISO/IEC 27001:2013 β†’ πŸ’Ό A.9.2.1 User registration and de-registration11
πŸ’Ό NIST SP 800-53 Revision 4 β†’ πŸ’Ό AC-1 ACCESS CONTROL POLICY AND PROCEDURES
πŸ’Ό NIST SP 800-53 Revision 4 β†’ πŸ’Ό AC-2 ACCOUNT MANAGEMENT1322
πŸ’Ό NIST SP 800-53 Revision 4 β†’ πŸ’Ό AC-3 ACCESS ENFORCEMENT10
πŸ’Ό NIST SP 800-53 Revision 4 β†’ πŸ’Ό AC-16 SECURITY ATTRIBUTES10
πŸ’Ό NIST SP 800-53 Revision 4 β†’ πŸ’Ό AC-19 ACCESS CONTROL FOR MOBILE DEVICES5
πŸ’Ό NIST SP 800-53 Revision 4 β†’ πŸ’Ό AC-24 ACCESS CONTROL DECISIONS2
πŸ’Ό NIST SP 800-53 Revision 4 β†’ πŸ’Ό IA-1 IDENTIFICATION AND AUTHENTICATION POLICY AND PROCEDURES
πŸ’Ό NIST SP 800-53 Revision 4 β†’ πŸ’Ό IA-2 IDENTIFICATION AND AUTHENTICATION (ORGANIZATIONAL USERS)1311
πŸ’Ό NIST SP 800-53 Revision 4 β†’ πŸ’Ό IA-4 IDENTIFIER MANAGEMENT7
πŸ’Ό NIST SP 800-53 Revision 4 β†’ πŸ’Ό IA-5 AUTHENTICATOR MANAGEMENT1522
πŸ’Ό NIST SP 800-53 Revision 4 β†’ πŸ’Ό IA-8 IDENTIFICATION AND AUTHENTICATION (NON-ORGANIZATIONAL USERS)5
πŸ’Ό NIST SP 800-53 Revision 4 β†’ πŸ’Ό PE-2 PHYSICAL ACCESS AUTHORIZATIONS3
πŸ’Ό NIST SP 800-53 Revision 4 β†’ πŸ’Ό PS-3 PERSONNEL SCREENING3

Similar Sections (Give Policies To)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό PR.AA-02: Identities are proofed and bound to credentials based on the context of interactions8

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags

Policies (8)​

PolicyLogic CountFlags
πŸ“ AWS Account IAM Password Policy Number of passwords to remember is not set to 24 🟒1🟒 x6
πŸ“ AWS EC2 Instance IAM role is not attached 🟒1🟒 x6
πŸ“ AWS IAM User has inline or directly attached policies 🟒1🟠 x1, 🟒 x5
πŸ“ AWS IAM User with console and programmatic access set during the initial creation 🟒🟒 x3
πŸ“ AWS S3 Bucket MFA Delete is not enabled 🟠🟒1🟠 x1, 🟒 x6
πŸ“ Azure App Service Authentication is disabled and Basic Authentication is enabled 🟒1🟒 x6
πŸ“ Azure App Service Basic Authentication is enabled 🟒🟒 x3
πŸ“ Consumer Google Accounts are used 🟒🟒 x3

Internal Rules​

RulePoliciesFlags
βœ‰οΈ dec-x-6c93750d1
βœ‰οΈ dec-x-4157c58a1
βœ‰οΈ dec-x-ca52f63a2
βœ‰οΈ dec-z-79f4ab881