Skip to main content

💼 Identity Management, Authentication and Access Control (PR.AC)

  • ID: /frameworks/nist-csf-v1.1/pr-ac

Description​

Access to physical and logical assets and associated facilities is limited to authorized users, processes, and devices, and is managed consistent with the assessed risk of unauthorized access to authorized activities and transactions.

Similar​

  • Internal
    • ID: dec-b-39ce21e1

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 PR.AC-1: Identities and credentials are issued, managed, verified, revoked, and audited for authorized devices, users and processes1934no data
💼 PR.AC-2: Physical access to assets is managed and protectedno data
💼 PR.AC-3: Remote access is managed22no data
💼 PR.AC-4: Access permissions and authorizations are managed, incorporating the principles of least privilege and separation of duties1756no data
💼 PR.AC-5: Network integrity is protected (e.g., network segregation, network segmentation)1044no data
💼 PR.AC-6: Identities are proofed and bound to credentials and asserted in interactions413no data
💼 PR.AC-7: Users, devices, and other assets are authenticated (e.g., single-factor, multi-factor) commensurate with the risk of the transaction (e.g., individuals' security and privacy risks and other organizational risks)1923no data