10.8.26.3.5 CM - Configuration Management. 10.8.26.3.4 CA - Assessment, Authorization, and Monitoring.10.8.26.3.3.5 AU-9 Protection of Audit Information.10.8.26.3.3.3 AU-5 Response to Audit Logging Process Failures.10.8.26.3.3 AU - Audit and Accountability.10.8.26.3.2.1 AT-2 Literacy Training and Awareness.10.8.26.3.2 AT - Awareness and Training.10.8.26.3.1.12.3 Access Control for Non-Government Furnished/Personally Owned (BYOD) Mobile Devices.10.8.26.3.1.12.2 Access Controls for Government Furnished Mobile Devices.10.8.26.3.1.12 AC-19 Access Controls for Mobile Devices.10.8.26.3.1.6 AC-9 Previous Logon (Access) Notification.10.8.26.2 Risk Acceptance and Risk-Based Decisions.10.8.26.1.6 Program Management and Review.10.8.26.1.5 Non-Government Furnished/Personally Owned (BYOD) Mobile Device Users.10.8.26.1.4 Government Furnished Mobile Device Users.10.8.26 Wireless and Mobile Device Security Policy.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |