CMMC 2.0 Control SC.L2-3.13.12 - Prohibit remote activation of collaborative computing devices and

CMMC 2.0 Control SC.L2-3.13.12 - Prohibit remote activation of collaborative computing devices and

CMMC 2.0 Control SC.L2-3.13.7 - Prevent remote devices from simultaneously establishing non-remoteПодробнее

CMMC 2.0 Control SC.L2-3.13.7 - Prevent remote devices from simultaneously establishing non-remote

NIST 800-171 Control 3.13.12 - Prohibit Remote Activation of Collaborative Computing DevicesПодробнее

NIST 800-171 Control 3.13.12 - Prohibit Remote Activation of Collaborative Computing Devices

CMMC 2.0 Control SC.L2-3.13.13 - Control and monitor the use of mobile codeПодробнее

CMMC 2.0 Control SC.L2-3.13.13 - Control and monitor the use of mobile code

CMMC 2.0 Control SC.L2-3.13.15 - Protect the authenticity of communications sessionsПодробнее

CMMC 2.0 Control SC.L2-3.13.15 - Protect the authenticity of communications sessions

CMMC 2.0 Control AC.L2-3.1.13: Secure Remote Access Sessions CryptographicallyПодробнее

CMMC 2.0 Control AC.L2-3.1.13: Secure Remote Access Sessions Cryptographically

CMMC 2.0 Control SC.L2-3.13.8 - Implement cryptographic mechanisms to prevent unauthorized disclosurПодробнее

CMMC 2.0 Control SC.L2-3.13.8 - Implement cryptographic mechanisms to prevent unauthorized disclosur

CMMC 2.0 Control SC.L2-3.13.4 - Prevent unauthorized and unintended information transfer via sharedПодробнее

CMMC 2.0 Control SC.L2-3.13.4 - Prevent unauthorized and unintended information transfer via shared

CMMC 2.0 Control SC.L2-3.13.2 - Employ architectural designs, software development techniques, andПодробнее

CMMC 2.0 Control SC.L2-3.13.2 - Employ architectural designs, software development techniques, and

CMMC 2.0 Control SC.L2-3.13.10 - Establish and manage cryptographic keys for cryptography employedПодробнее

CMMC 2.0 Control SC.L2-3.13.10 - Establish and manage cryptographic keys for cryptography employed

CMMC 2.0 Control AC.L2-3.1.16: Pre-approve Wireless Access for ConnectionsПодробнее

CMMC 2.0 Control AC.L2-3.1.16: Pre-approve Wireless Access for Connections

CMMC 2.0 Control SC.L2-3.13.14 - Control and monitor the use of Voice over Internet Protocol (VoIP)Подробнее

CMMC 2.0 Control SC.L2-3.13.14 - Control and monitor the use of Voice over Internet Protocol (VoIP)

CMMC 2.0 Control SC.L2-3.13.9 - Terminate network connections associated with communicationsПодробнее

CMMC 2.0 Control SC.L2-3.13.9 - Terminate network connections associated with communications

CMMC 2.0 Control MP.L2-3.8.8 - Prohibit the use of portable storage devices when such devices haveПодробнее

CMMC 2.0 Control MP.L2-3.8.8 - Prohibit the use of portable storage devices when such devices have

CMMC 2.0 Control AC.L2-3.1.17: Protect Wireless Access Using Authentication and EncryptionПодробнее

CMMC 2.0 Control AC.L2-3.1.17: Protect Wireless Access Using Authentication and Encryption

CMMC 2.0 Control SC.L2-3.13.11 - Employ FIPS-validated cryptography when used to protect theПодробнее

CMMC 2.0 Control SC.L2-3.13.11 - Employ FIPS-validated cryptography when used to protect the

CMMC 2.0 Control SC.L2-3.13.3 - Separate user functionality from system management functionalityПодробнее

CMMC 2.0 Control SC.L2-3.13.3 - Separate user functionality from system management functionality

CMMC 2.0 Control SC.L1-3.13.1 - Monitor, control, and protect communications (i.e., informationПодробнее

CMMC 2.0 Control SC.L1-3.13.1 - Monitor, control, and protect communications (i.e., information

CMMC 2.0 Control AI.L2-3.5.11 - Obscure feedback of authentication informationПодробнее

CMMC 2.0 Control AI.L2-3.5.11 - Obscure feedback of authentication information

CMMC 2.0 Control SC.L2-3.13.16 - Protect the confidentiality of CUI at restПодробнее

CMMC 2.0 Control SC.L2-3.13.16 - Protect the confidentiality of CUI at rest

Актуальное