Configuration Management (CM)

Control and monitor user-installed software.


Login

Configuration Management (CM)

Establish and maintain an authoritative source and repository to provide a trusted source and accountability for approved and implemented system components.


Login

Configuration Management (CM)

Employ automated mechanisms to detect misconfigured or unauthorized system components; after detection, remove the components or place the components in a quarantine or remediation network to facilitate patching, re-configuration, or other mitigations.


Login

Configuration Management (CM)

Employ automated discovery and management tools to maintain an up-to-date, complete, accurate, and readily available inventory of system components.


Login

Identification and Authentication (IA)

Identify information system users, processes acting on behalf of users, or devices.


Login

Identification and Authentication (IA)

Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems.


Login

Identification and Authentication (IA)

Identify system users, processes acting on behalf of users, and devices.


Login

Identification and Authentication (IA)

Authenticate (or verify) the identities of users, processes, or devices, as a prerequisite to allowing access to organizational systems.


Login

Identification and Authentication (IA)

Use multifactor authentication for local and network access to privileged accounts and for network access to non-privileged accounts.


Login

Identification and Authentication (IA)

Employ replay-resistant authentication mechanisms for network access to privileged and non-privileged accounts.


Login