NIST Control

This category stores NIST related controls

Showing 5 random demo records from library Please login for full library access

NIST Control (1,213)



# Name Description
1 NIST-SP_800-53r5_IA-2(12): Identification and Authentication (Organizational Users) | Acceptance of PIV Credentials Control: PIV Credential Acceptance and Verification Control Objective: To ensure that only verified Personal Identity Verification credentials grant access to organizational resources. Description: Implement a system to accept and electronically verify PIV-compliant credentials to ensure the identity of users accessing sensitive information and systems. Control Owners: Security Officer (Information Security Department) Control Impacts: *Enhanced Access Security* By verifying PIV-complia ...
2 NIST-PF-1.0_CT.PO-P4: Data Lifecycle Management Alignment Control: NIST-PF-1.0_CT.PO-P4: Data Lifecycle Management Alignment Control Objective: Ensure the integration of data lifecycle management with system development processes. Description: Establish and maintain a framework that aligns the data lifecycle management with the system development lifecycle to enhance data governance and security throughout all phases. Control Owners: Data Governance Officer (Data Management Department) Control Impacts: *Improved Data Governance* Strengthens th ...
3 NIST-SP_800-53r5_CA-9(1): Internal System Connections | Compliance Checks Control: Internal Connection Compliance Verification Control Objective: To ensure all internal system connections meet security and privacy compliance requirements. Description: This control mandates the performance of security and privacy compliance checks on system components before establishing internal connections, ensuring adherence to baseline configurations. Control Owners: Chief Security Officer (Security Department) Control Impacts: *Risk Mitigation* By verifying compliance, th ...
4 NIST-SP_800-53r5_SC-7(8): Boundary Protection | Route Traffic to Authenticated Proxy Servers Control: Traffic Routing to Authenticated Proxies Control Objective: To ensure that internal communications traffic is securely routed through authenticated proxy servers. Description: This control mandates the routing of internal communications traffic to designated external networks exclusively through authenticated proxy servers, creating a secure buffer against unauthorized access. Control Owners: Network Security Manager (IT Security Department) Control Impacts: *Enhanced Security* ...
5 NIST-SP_800-53r5_AC-25: Reference Monitor Control: Reference Validation Mechanism Control Objective: To enforce an organization-defined access control policy effectively and securely. Description: Implement a reference validation mechanism that is tamper-proof, consistently invoked, and suitable for analysis to ensure compliance with access control policies. Control Owners: Chief Information Officer (Information Technology Department) Control Impacts: *Enhanced Security* Protects system integrity by enforcing access restriction ...