CMMC 2.0 Control SC.L2-3.13.13 - Control and monitor the use of mobile code

CMMC 2.0 Control SC.L2-3.13.13 - Control and monitor the use of mobile code

NIST 800-171 Control 3.13.13 - Control and Monitor the Use of Mobile CodeПодробнее

NIST 800-171 Control 3.13.13 - Control and Monitor the Use of Mobile Code

CMMC 2.0 Control SC.L2-3.13.14 - Control and monitor the use of Voice over Internet Protocol (VoIP)Подробнее

CMMC 2.0 Control SC.L2-3.13.14 - Control and monitor the use of Voice over Internet Protocol (VoIP)

CMMC 2.0 Control SC.L2-3.13.7 - Prevent remote devices from simultaneously establishing non-remoteПодробнее

CMMC 2.0 Control SC.L2-3.13.7 - Prevent remote devices from simultaneously establishing non-remote

CMMC 2.0 Control AC.L2-3.1.19: Encrypt CUI on Mobile Devices and PlatformsПодробнее

CMMC 2.0 Control AC.L2-3.1.19: Encrypt CUI on Mobile Devices and Platforms

CMMC 2.0 Control SC.L2-3.13.15 - Protect the authenticity of communications sessionsПодробнее

CMMC 2.0 Control SC.L2-3.13.15 - Protect the authenticity of communications sessions

CMMC 2.0 Control SC.L2-3.13.12 - Prohibit remote activation of collaborative computing devices andПодробнее

CMMC 2.0 Control SC.L2-3.13.12 - Prohibit remote activation of collaborative computing devices and

CMMC 2.0 Control SC.L2-3.13.10 - Establish and manage cryptographic keys for cryptography employedПодробнее

CMMC 2.0 Control SC.L2-3.13.10 - Establish and manage cryptographic keys for cryptography employed

CMMC 2.0 Control AC.L2-3.1.17: Protect Wireless Access Using Authentication and EncryptionПодробнее

CMMC 2.0 Control AC.L2-3.1.17: Protect Wireless Access Using Authentication and Encryption

CMMC 2.0 Control SC.L2-3.13.4 - Prevent unauthorized and unintended information transfer via sharedПодробнее

CMMC 2.0 Control SC.L2-3.13.4 - Prevent unauthorized and unintended information transfer via shared

CMMC 2.0 Control AC.L2-3.1.16: Pre-approve Wireless Access for ConnectionsПодробнее

CMMC 2.0 Control AC.L2-3.1.16: Pre-approve Wireless Access for Connections

CMMC 2.0 Control SC.L2-3.13.2 - Employ architectural designs, software development techniques, andПодробнее

CMMC 2.0 Control SC.L2-3.13.2 - Employ architectural designs, software development techniques, and

CMMC 2 0 Control AC.L2-3.1.14: Control Remote Access Through Managed PointsПодробнее

CMMC 2 0 Control AC.L2-3.1.14: Control Remote Access Through Managed Points

CMMC 2.0 Control SC.L2-3.13.8 - Implement cryptographic mechanisms to prevent unauthorized disclosurПодробнее

CMMC 2.0 Control SC.L2-3.13.8 - Implement cryptographic mechanisms to prevent unauthorized disclosur

CMMC 2.0 Control PS L2-3.9.1 - Screen individuals prior to authorizing access to organizationalПодробнее

CMMC 2.0 Control PS L2-3.9.1 - Screen individuals prior to authorizing access to organizational

CMMC 2.0 Control SC.L2-3.13.3 - Separate user functionality from system management functionalityПодробнее

CMMC 2.0 Control SC.L2-3.13.3 - Separate user functionality from system management functionality

CMMC 2.0 Control CA L2-3.12.3 - Monitoring Security Controls for Continued EffectivenessПодробнее

CMMC 2.0 Control CA L2-3.12.3 - Monitoring Security Controls for Continued Effectiveness

CMMC 2.0 Control IA.L2-3.5.3 - Use multifactor authentication for local and network access toПодробнее

CMMC 2.0 Control IA.L2-3.5.3 - Use multifactor authentication for local and network access to

CMMC 2.0 Control SC.L2-3.13.16 - Protect the confidentiality of CUI at restПодробнее

CMMC 2.0 Control SC.L2-3.13.16 - Protect the confidentiality of CUI at rest

Новости