Skip to main content

💼 8.1 Processes and mechanisms for identifying users and authenticating access to system components are defined and understood.

Description​

Empty...

Similar​

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags
💼 8.1.1 All security policies and operational procedures identified in Requirement 8 are documented, kept up to date, in use, and known to all affected parties.
💼 8.1.2 Roles and responsibilities for performing activities in Requirement 8 are documented, assigned, and understood.