Control ID | PAT | Security Requirement |
---|---|---|
3.5.1.a | P | Identifying System Users, Processes, and Devices Policy |
T | Identifying System Users, Processes, and Devices Policy Training Material and Comprehension Quiz | |
3.5.1.b | P | Identifying Processes Acting on Behalf of Users Policy |
T | Identifying Processes Acting on Behalf of Users Policy Training Material and Comprehension Quiz | |
3.5.1.c | P | Identifying Devices Accessing the System Policy |
T | Identifying Devices Accessing the System Policy Training Material and Comprehension Quiz | |
3.5.2.a | P | User Identity Authentication as a Prerequisite for System Access |
T | User Identity Authentication as a Prerequisite for System Access Training Material and Comprehension Quiz | |
3.5.2.b | P | Authentication of Processes Acting on Behalf of Users Policy |
T | Authentication of Processes Acting on Behalf of Users Policy Training Material and Comprehension Quiz | |
3.5.2.c | P | Authentication of Device Identity Prior to System Access Policy |
T | Authentication of Device Identity Prior to System Access Policy Training Material and Comprehension Quiz | |
3.5.3.a | P | Identifying Privileged Accounts Policy |
T | Identifying Privileged Accounts Policy Training Material and Comprehension Quiz | |
3.5.3.b | P | Implementing Multi Factor Authentication for Local Access to Privileged Accounts Policy |
T | Implementing Multi Factor Authentication for Local Access to Privileged Accounts Policy Training Material and Comprehension Quiz | |
3.5.3.c | P | Implementing Multi Factor Authentication for Network Access to Privileged Accounts Policy |
T | Implementing Multi Factor Authentication for Network Access to Privileged Accounts Policy Training Material and Comprehension Quiz | |
3.5.3.d | P | Implementing Multi Factor Authentication for Network Access to Non-Privileged Accounts Policy |
T | Implementing Multi Factor Authentication for Network Access to Non-Privileged Accounts Policy Training Material and Comprehension Quiz | |
3.5.4 | P | Replay-resistant authentication mechanisms are implemented for network account access to privileged and non-privileged accounts |
T | Replay-resistant authentication mechanisms are implemented for network account access to privileged and non-privileged accounts Training Material and Comprehension Quiz | |
3.5.5.a | P | Period Within Which Identifiers Cannot Be Reused Policy |
T | Period Within Which Identifiers Cannot Be Reused Policy Training Material and Comprehension Quiz | |
3.5.5.b | P | Preventing the Reuse of Identifiers for a Defined Period Policy |
T | Preventing the Reuse of Identifiers for a Defined Period Policy Training Material and Comprehension Quiz | |
3.5.6.a | P | Inactivity Period Leading to Identifier Deactivation Policy |
T | Inactivity Period Leading to Identifier Deactivation Policy Training Material and Comprehension Quiz | |
3.5.6.b | P | Preventing the Reuse of Identifiers for a Defined Period Policy |
T | Preventing the Reuse of Identifiers for a Defined Period Policy Training Material and Comprehension Quiz | |
3.5.7.a | P | Defining Password Complexity Requirements Policy |
T | Defining Password Complexity Requirements Policy Training Material and Comprehension Quiz | |
3.5.7.b | P | Defining Password Character Change Requirements Policy |
T | Defining Password Character Change Requirements Policy Training Material and Comprehension Quiz | |
3.5.7.c | P | Enforcing Minimum Password Complexity Requirements When Creating New Passwords Policy |
T | Enforcing Minimum Password Complexity Requirements When Creating New Passwords Policy Training Material and Comprehension Quiz | |
3.5.7.d | P | Enforcing Minimum Password Character Change Requirements When Creating New Passwords Policy |
T | Enforcing Minimum Password Character Change Requirements When Creating New Passwords Policy Training Material and Comprehension Quiz | |
3.5.8.a | P | Password Reuse Limitation Policy |
T | Password Reuse Limitation Policy Training Material and Comprehension Quiz | |
3.5.8.b | P | Prohibit Password Reuse for a Specified Number of Generations |
T | Prohibit Password Reuse for a Specified Number of Generations policy Training Material and Comprehension Quiz | |
3.5.9 | P | Password Reuse Limitation Policy |
T | Password Reuse Limitation Policy Training Material and Comprehension Quiz | |
3.5.10.a | P | Passwords are Cryptographically Protected in Storage |
T | Passwords are Cryptographically Protected in Storage Training Material and Comprehension Quiz | |
3.5.10.b | P | Passwords Are Cryptographically Protected in Transit Policy |
T | Passwords Are Cryptographically Protected in Transit Training Material and Comprehension Quiz | |
3.5.11 | P | Ensuring Authentication Information is Obscured During the Authentication Process Policy |
T | Ensuring Authentication Information is Obscured During the Authentication Process Policy Training Material and Comprehension Quiz |
Privacy Policy | Terms of Service
© 2025 IntelComp. Powered by interlinkIQ.com, Developed by ITBlaster.net, Owned and Operated by Consultare Inc. Group, A Compliance Company. All Rights Reserved.