
Sign up to save your podcasts
Or
Mini-Capsules - NIST Cybersecurity Framework (NIST CSF) - Episode 8 - Protect – Identity Management and Access Control (PR.AC)
Dans l'épisode d'aujourd'hui, Frederic Deneault vulgarise les contrôles de la catégorie Identity Management and Access Control (PR.AC) de la fonction Protect du NIST cybersecurity framework.
NIST CSF PR.AC-1: Identities and credentials are issued, managed, verified, revoked, and audited for authorized devices, users and processes
NIST CSF PR.AC-2: Physical access to assets is managed and protected
NIST CSF PR.AC-3: Remote access is managed
NIST CSF PR.AC-4: Access permissions and authorizations are managed, incorporating the principles of least privilege and separation of duties
NIST CSF PR.AC-5: Network integrity is protected (e.g., network segregation, network segmentation)
NIST CSF PR.AC-6: Identities are proofed and bound to credentials and asserted in interactions
NIST CSF PR.AC-7: Users, devices, and other assets are authenticated (e.g., single-factor, multi-factor) commensurate with the risk of the transaction (e.g., individuals’ security and privacy risks and other organizational risks)
Si vous avez des questions ou vous voulez partager votre opinion, n'hésitez pas!
Suivez-moi sur LinkedIn: - Frederic Deneault https://bit.ly/38BEZp2
Le podcast Discutons Gouvernance https://bit.ly/2YdfJn4
Mini-Capsules - NIST Cybersecurity Framework (NIST CSF) - Episode 8 - Protect – Identity Management and Access Control (PR.AC)
Dans l'épisode d'aujourd'hui, Frederic Deneault vulgarise les contrôles de la catégorie Identity Management and Access Control (PR.AC) de la fonction Protect du NIST cybersecurity framework.
NIST CSF PR.AC-1: Identities and credentials are issued, managed, verified, revoked, and audited for authorized devices, users and processes
NIST CSF PR.AC-2: Physical access to assets is managed and protected
NIST CSF PR.AC-3: Remote access is managed
NIST CSF PR.AC-4: Access permissions and authorizations are managed, incorporating the principles of least privilege and separation of duties
NIST CSF PR.AC-5: Network integrity is protected (e.g., network segregation, network segmentation)
NIST CSF PR.AC-6: Identities are proofed and bound to credentials and asserted in interactions
NIST CSF PR.AC-7: Users, devices, and other assets are authenticated (e.g., single-factor, multi-factor) commensurate with the risk of the transaction (e.g., individuals’ security and privacy risks and other organizational risks)
Si vous avez des questions ou vous voulez partager votre opinion, n'hésitez pas!
Suivez-moi sur LinkedIn: - Frederic Deneault https://bit.ly/38BEZp2
Le podcast Discutons Gouvernance https://bit.ly/2YdfJn4