SEARCH RESULTS


Microsoft Entra – Configure CMMC Level 1 controls     3.5 3.5.1 Identification and Authentication

https://learn.microsoft.com/en-us/entra/standards/configure-cmmc-level-1-controls

Microsoft Entra ID meets identity-related practice requirements in each Cybersecurity Maturity Model Certification (CMMC) level. To be compliant with requirements in CMMC, it's the responsibility of companies performing work with, and on behalf of, the US Dept. of Defense (DoD) to complete other configurations or processes. In CMMC Level 1, there are three domains that have one or more practices related to identity: Access Control (AC), Identification and Authentication (IA), and System and Information integrity (SI)

NIST SP 800-111: Guide to Storage Encryption Technologies for End User Devices     3.1 3.1.19 3.13 3.13.10 3.13.11 3.13.16 3.5 3.5.10 3.8 3.8.1 3.8.2 3.8.6 Access Control Identification and Authentication Media Protection System and Communications Protection

https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-111.pdf

This NIST Special Publication provides recommendations to facilitate more efficient and effective storage encryption solution design, implementation, and management for Federal departments and agencies.

NIST SP 800-175B Rev 1: Guideline for Using Cryptographic Standards in the Federal Government     3.1 3.1.13 3.1.17 3.1.19 3.13 3.13.10 3.13.11 3.13.15 3.13.16 3.13.8 3.5 3.5.10 3.8 3.8.6 Access Control Identification and Authentication Media Protection System and Communications Protection

https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-175Br1.pdf

This NIST Special Publication is one part in a series of documents intended to provide guidance to the Federal Government for using cryptography to protect its sensitive, but unclassified digitized information during transmission and while in storage.

Open Web Application Security Project (OWASP) – Testing for Account Enumeration and Guessable User Account     3.5.2 3.5.7 3.5.8 3.5.9 csc4.2 Identification and Authentication

https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/03-Identity_Management_Testing/04-Testing_for_Account_Enumeration_and_Guessable_User_Account

The scope of this test is to verify if it is possible to collect a set of valid usernames by interacting with the authentication mechanism of the application.