9.4.Network Architecture 12
10.System Environment and Inventory 13
10.1.Data Flow 13
10.2.Ports, Protocols and Services 15
11.System Interconnections 16
12.Laws, Regulations, Standards and Guidance 19
12.1.Applicable Laws and Regulations 19
12.2.Applicable Standards and Guidance 19
13.Minimum Security Controls 20
13.1.Access Control (AC) 29
AC-1 Access Control Policy and Procedures Requirements (H) 29
AC-2 Account Management (H) 30
AC-2 (1) Control Enhancement (M) (H) 32
AC-2 (2) Control Enhancement (H) 32
AC-2 (3) Control Enhancement (H) 33
AC-2 (4) Control Enhancement (H) 34
AC-2 (5) Control Enhancement (H) 35
AC-2 (7) Control Enhancement (H) 36
AC-2 (9) Control Enhancement (H) 37
AC-2 (10) Control Enhancement (M) (H) 37
AC-2 (11) Control Enhancement (H) 38
AC-2 (12) Control Enhancement (H) 39
AC-2 (13) Control Enhancement (H) 40
AC-3 Access Enforcement (L) (M) (H) 41
AC-4 Information Flow Enforcement (M) (H) 41
AC-4 (8) Control Enhancement (H) 42
AC-4 (21) Control Enhancement (M) (H) 43
AC-5 Separation of Duties (M) (H) 44
AC-6 Least Privilege (M) (H) 45
AC-6 (1) Control Enhancement (H) 45
AC-6 (2) Control Enhancement (M) (H) 46
AC-6 (3) Control Enhancement (H) 47
AC 6 (5) Control Enhancement (M) (H) 48
AC-6 (7) Control Enhancement (H) 49
AC-6 (8) Control Enhancement (H) 50
AC-6 (9) Control Enhancement (M) (H) 50
AC-6 (10) Control Enhancement (M) (H) 51
AC-7 Unsuccessful Login Attempts (H) 52
AC-7 (2) Control Enhancement (H) 53
AC-8 System Use Notification (L) (M) (H) 53
AC-10 Concurrent Session Control (M) (H) 56
AC-11 Session Lock (M) (H) 57
AC-11 (1) Control Enhancement (M) (H) 58
AC-12 Session Termination (M) (H) 59
AC-12 (1) Control Enhancement (H) 59
AC-14 Permitted Actions without Identification or Authentication (L) (M) (H) 60
AC-17 Remote Access (L) (M) (H) 61
AC-17 (1) Control Enhancement (M) (H) 62
AC-17 (2) Control Enhancement (M) (H) 63
AC-17 (3) Control Enhancement (M) (H) 64
AC-17 (4) Control Enhancement (M) (H) 64
AC-17 (9) Control Enhancement (M) (H) 65
AC-18 Wireless Access Restrictions (L) (M) (H) 66
AC-18 (1) Control Enhancement (M) (H) 67
AC-18 (3) Control Enhancement (H) 67
AC-18 (4) Control Enhancement (H) 68
AC-18 (5) Control Enhancement (H) 69
AC-19 Access Control for Portable and Mobile Systems (L) (M) (H) 70
AC-19 (5) Control Enhancement (M) (H) 70
AC-20 Use of External Information Systems (L) (M) (H) 71
AC-20 (1) Control Enhancement (M) (H) 72
AC-20 (2) Control Enhancement (M) (H) 73
AC-21 Information Sharing (M) (H) 74
AC-22 Publicly Accessible Content (L) (M) (H) 75
Share with your friends: |