State of Alabama – System Maintenance Policy 3.5 3.5.2 3.5.3 3.7 3.7.5 Identification and Authentication Maintenance
This example policy from the State of Alabama provides a starting point for system maintenance.
This example policy from the State of Alabama provides a starting point for system maintenance.
This whitepaper is directed at IT, Security, and Compliance workers who are responsible for recommending or evaluating security products; or running and managing two-factor authentication infrastructure.
This is an example of an identification and authentication policy for Texas A&M
This example policy describes how information resources shall obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.
This example policy describes the configuration of resources to uniquely identify and authenticate users not affiliated with the university who are permitted to utilize university information resources.
This example policy describes the capability for information resources to uniquely identify and authenticate university faculty, staff, students, and other approved users.
This example policy describes how user or device identifiers are managed by receiving appropriate authorization to initially assign a user, selecting a unique identifier, preventing the reuse of identifiers, and disabling the user identifier after a period of inactivity or change in job status.
Gemalto's identity and access management (IAM) solutions allow organizations to meet the evolving needs around cloud applications and mobile devices.
This document provides a study of a unique class of attack and several methods attempting to prevent attacks of a kind.
US-CERT alert that reviews the risk associated with default passwords on internet-connected systems.