X hits on this document

Powerpoint document

HHS Cybersecurity Program Training Information Security for Information Technology (IT) Administrato... - page 74 / 158

458 views

0 shares

0 downloads

0 comments

74 / 158

U.S. Department of Health and Human Services

The control families within the Technical Controls are:

IA-1 - Identification and Authentication Policy and Procedures

IA-2 - Identification and Authentication (Organizational Users)

IA-3 - Device Identification and Authentication

IA-4 - Identifier Management

IA-5 - Authenticator Management

IA-6 - Authenticator Feedback

IA-7 - Cryptographic Module Authentication

IA-8 – Identification and Authentication (Non-Organizational Users)

Page 6 of 12

Security  Control Selection

Identification and Authentication

Document info
Document views458
Page views458
Page last viewedSat Dec 10 11:57:39 UTC 2016
Pages158
Paragraphs2058
Words16945

Comments