NIST 800-171 v2

110 security requirements available

Sort by:|110 results
Access ControlBasic

Limit system access to authorized users, processes acting on behalf of authorized users, and devices (including other systems).

Access ControlBasic

Limit system access to the types of transactions and functions that authorized users are permitted to execute.

Access ControlDerived

Control the flow of CUI in accordance with approved authorizations.

Access ControlDerived

Separate the duties of individuals to reduce the risk of malevolent activity without collusion.

Access ControlDerived

Employ the principle of least privilege, including for specific security functions and privileged accounts.

Access ControlDerived

Use non-privileged accounts or roles when accessing nonsecurity functions

Access ControlDerived

Prevent non-privileged users from executing privileged functions and capture the execution of such functions in audit logs.

Access ControlDerived

Limit unsuccessful logon attempts.

Access ControlDerived

Provide privacy and security notices consistent with applicable CUI rules.

Access ControlDerived

Use session lock with pattern-hiding displays to prevent access and viewing of data after a period of inactivity

Access ControlDerived

Terminate (automatically) a user session after a defined condition.

Access ControlDerived

Monitor and control remote access sessions.

Access ControlDerived

Employ cryptographic mechanisms to protect the confidentiality of remote access sessions.

Access ControlDerived

Route remote access via managed access control points.

Access ControlDerived

Authorize remote execution of privileged commands and remote access to security-relevant information.

Access ControlDerived

Authorize wireless access prior to allowing such connections

Access ControlDerived

Protect wireless access using authentication and encryption

Access ControlDerived

Control connection of mobile devices.

Access ControlDerived

Encrypt CUI on mobile devices and mobile computing platforms.[23]

Access ControlDerived

Verify and control/limit connections to and use of external systems.

Access ControlDerived

Limit use of portable storage devices on external systems.

Access ControlDerived

Control CUI posted or processed on publicly accessible systems.

Awareness and TrainingBasic

Ensure that managers, systems administrators, and users of organizational systems are made aware of the security risks associated with their activities and of the applicable policies, standards, and procedures related to the security of those systems.

Awareness and TrainingBasic

Ensure that personnel are trained to carry out their assigned information security-related duties and responsibilities.

Awareness and TrainingDerived

Provide security awareness training on recognizing and reporting potential indicators of insider threat.

Showing 125 of 110|Per page: