![]() ![]() 10.8.26.3.7 IA - Identification and Authentication. ![]() 10.8.26.3.5.2 CM-5 Access Restrictions for Change.10.8.26.3.5 CM - Configuration Management.10.8.26.3.4 CA - Assessment, Authorization, and Monitoring.10.8.26.3.3.5 AU-9 Protection of Audit Information.10.8.26.3.3.3 AU-5 Response to Audit Logging Process Failures.10.8.26.3.3 AU - Audit and Accountability.10.8.26.3.2.1 AT-2 Literacy Training and Awareness.10.8.26.3.2 AT - Awareness and Training.10.8.26.3.1.12.3 Access Control for Non-Government Furnished/Personally Owned (BYOD) Mobile Devices.10.8.26.3.1.12.2 Access Controls for Government Furnished Mobile Devices. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |