πΌ NIST CSF v1.1 β πΌ PR.AC-3: Remote access is managed | | | | |
πΌ NIST CSF v1.1 β πΌ PR.AC-7: Users, devices, and other assets are authenticated (e.g., single-factor, multi-factor) commensurate with the risk of the transaction (e.g., individuals' security and privacy risks and other organizational risks) | | 19 | 22 | |
πΌ NIST SP 800-53 Revision 5 β πΌ AC-7 Unsuccessful Logon Attempts | 4 | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ AC-12 Session Termination | 3 | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ IA-2 Identification and Authentication (organizational Users) | 13 | | 2 | |
πΌ NIST SP 800-53 Revision 5 β πΌ IA-3 Device Identification and Authentication | 4 | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ IA-5 Authenticator Management | 18 | | 4 | |
πΌ NIST SP 800-53 Revision 5 β πΌ IA-7 Cryptographic Module Authentication | | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ IA-8 Identification and Authentication (non-organizational Users) | 6 | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ IA-9 Service Identification and Authentication | 2 | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ IA-10 Adaptive Authentication | | | | |
πΌ NIST SP 800-53 Revision 5 β πΌ IA-11 Re-authentication | | | | |