
NIST Cybersecurity Framework (CSF) 2.0 Reference Tool. This is a download from the CSF 2.0 Reference Tool, which assists users in exploring the CSF 2.0 Core. This export is a user generated …
Backup and recovery procedures are formally documented and followed. Backup and recovery procedures are periodically tested.
Routers should be configured to ensure authenticated access control, strong two-factor authentication, encryption of the management session, and audit logs are all being incorporated in the access scheme.
Users, devices, and other assets are authenticated (e.g., single-factor, multi-factor) commensurate with the risk of the transaction (e.g., individuals’ security and privacy risks and other organizational risks)
When biometric authentication meets the requirements in Sec. 5.2.3, the associated device must be authenticated along with the biometric. The associated device then serves as “something you have,” …
- [XLS]
www.fedramp.gov
When completed, FedRAMP will accept this inventory workbook as the inventory information required by the following: - System Security Plan . - Security Assessment Plan. - Security Assessment Report . - …
Users, devices, and other assets are authenticated (e.g., single-factor, multi-factor) commensurate with the risk of the transaction (e.g., individuals’ security and privacy risks and other organizational risks)