0
Skip to Content
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Rules
Licensing
Account
Folder: Libaries
Back
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
PR.AC-5: Identity Management, Authentication and Access Control
IAM, Authentication, Access Control, Integrity, Segmentation Jeremy Pickett 11/21/24 IAM, Authentication, Access Control, Integrity, Segmentation Jeremy Pickett 11/21/24

PR.AC-5: Identity Management, Authentication and Access Control

Network integrity is protected (e.g., network segregation, network segmentation).

Read More
PR.AC-4: Identity Management, Authentication and Access Control
Physical Access, Authentication, Remote Access, Least Privilege Jeremy Pickett 11/20/24 Physical Access, Authentication, Remote Access, Least Privilege Jeremy Pickett 11/20/24

PR.AC-4: Identity Management, Authentication and Access Control

Access permissions and authorizations are managed, incorporating the principles of least privilege and separation of duties.

Read More
PR.AC-3: Identity Management, Authentication and Access Control
Physical Access, Authentication, Remote Access Jeremy Pickett 11/19/24 Physical Access, Authentication, Remote Access Jeremy Pickett 11/19/24

PR.AC-3: Identity Management, Authentication and Access Control

Remote access is managed.

Read More
PR.AC-2: Identity Management, Authentication and Access Control
Physical Access, Authentication Jeremy Pickett 11/18/24 Physical Access, Authentication Jeremy Pickett 11/18/24

PR.AC-2: Identity Management, Authentication and Access Control

Physical access to assets is managed and protected.

Read More
PR.AC-1: Identity Management, Authentication and Access Control
Risk, IAM, Authentication, Access Control Jeremy Pickett 11/15/24 Risk, IAM, Authentication, Access Control Jeremy Pickett 11/15/24

PR.AC-1: Identity Management, Authentication and Access Control

Identities and credentials are issued, managed, verified, revoked, and audited for authorized devices, users, and processes.

Read More

Contact: jeremy@japhontech.com : : japhontech, LLC