Level N/A
Define, implement and evaluate processes, procedures and technical measures to verify access to data and system functions is authorized.
Parent
Compliance Framework
CCM v4.0.10
Control Number
IAM-16
Related
Compliance Framework
CIS v8.0
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST 800-53 Rev 5
NIST CSF v1.1
NIST CSF v1.1
NIST CSF v1.1
NIST CSF v1.1
NIST CSF v1.1
Secure Controls Framework 2023.4
Secure Controls Framework 2023.4
Secure Controls Framework 2023.4
Secure Controls Framework 2023.4
Secure Controls Framework 2023.4
Secure Controls Framework 2023.4
Secure Controls Framework 2023.4
Secure Controls Framework 2023.4
Secure Controls Framework 2023.4
Secure Controls Framework 2023.4
Secure Controls Framework 2023.4
Secure Controls Framework 2023.4
Secure Controls Framework 2023.4
CIS v8.0
Control Number