Skip to main content

๐Ÿ’ผ 8.1 Processes and mechanisms for identifying users and authenticating access to system components are defined and understood.

Descriptionโ€‹

Empty...

Similarโ€‹

Sub Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlags
๐Ÿ’ผ 8.1.1 All security policies and operational procedures identified in Requirement 8 are documented, kept up to date, in use, and known to all affected parties.
๐Ÿ’ผ 8.1.2 Roles and responsibilities for performing activities in Requirement 8 are documented, assigned, and understood.